Académique Documents
Professionnel Documents
Culture Documents
User Conventions
Approved version
5.2.4.5 Removed
6.1.7 More detailed description added
7.2.2 Chapter for redundant lines balanced mode
rewritten
7.5 Clarified
2.0 00-03-24 Foreword Text regarding the maintenance of the document
added.
1 Texts added regarding existence of
supplementary definitions to IEC 870-5-101 and
the priority of documents if conflict between
documents occurs
2.3 Definition of controlling and controlled station
added
4.2 Added: Day of week is not used and set to 0.
4.2.9 Text removed: Two octet Common addresses can
be used within NUC
5.1 Interoperability - Text modified due to new
notation. Additional functions/ASDUs can be used
on project bases.
5.1.1 - 5.1.5 Notation for selected functions/ASDUs in the
interoperability list modified.
FOREWORD ............................................................................................................................. 7
1 INTRODUCTION ................................................................................................................ 8
2 PROTOCOL STRUCTURE................................................................................................. 9
2.1 Communication Protocol ............................................................................................ 9
2.2 Anatomy of a communication Protocol ...................................................................... 9
2.3 Definitions................................................................................................................. 10
2.4 Protocol structure ...................................................................................................... 11
7 FUNCTIONS.................................................................................................................... 152
7.1 Event handling ........................................................................................................ 152
7.1.1 Transfer of data from Controlled Station to Controlling Station ............... 152
7.1.2 Event Buffers ............................................................................................. 152
7.1.3 Indications.................................................................................................. 152
7.1.4 Measured values......................................................................................... 152
7.1.5 Pulse Counters ........................................................................................... 152
7.1.6 Priorities..................................................................................................... 152
7.2 Redundant lines....................................................................................................... 153
7.2.1 Unbalanced mode....................................................................................... 153
7.2.1.1 General requirements ............................................................... 153
7.2.1.2 Initialisation.............................................................................. 154
7.2.1.3 Automatic line switch............................................................... 155
7.2.1.4 Application initiated line switch .............................................. 157
7.2.2 Balanced mode........................................................................................... 158
7.2.2.1 General requirements ............................................................... 158
7.2.2.2 Initialisation of controlling station ........................................... 158
7.2.2.3 Initialisation of controlled station............................................. 160
7.2.2.4 User data from controlling station (commands)....................... 162
7.2.2.5 User data from controlled station ............................................. 164
7.3 Addressing .............................................................................................................. 166
7.3.1 Link Address .............................................................................................. 166
7.3.2 Common Address of ASDU ...................................................................... 166
7.3.3 Information Object Address....................................................................... 166
7.3.4 Addressing rules......................................................................................... 166
7.3.5 Possible addressing conventions................................................................ 166
7.4 Internal events ........................................................................................................ 167
7.5 Parameter loading ................................................................................................... 167
7.6 Frame length ........................................................................................................... 167
7.7 Database handling ................................................................................................... 167
7.8 Scaling..................................................................................................................... 167
Foreword
The Norwegian User Conventions for IEC 870-5-101 has been developed in a project involving many of the major companies in
the area of power generation and power distribution. Also the major control equipment suppliers has contributed both financially
and with actual work in the project. The project has been managed by RF-Rogaland Research and the steering committee has
been headed by Statnet SF. About 40% of the financial support for the project has been supplied by The Research Council of
Norway, the rest has been financed by support from the following companies:
ABB Kraft AS
Aker Elektro AS
Bailey Norge AS
I/S Øvre Otra
Lyse Kraft AS
Malthe Winje Automasjon AS
Nord-Trøndelag Elektrisitetsverk
Norsk Hydro ASA
Siemens AS
Statkraft SF
Statnett SF
Trondheim Energiverk AS
Vestfold Kraft DA
Viken Energinett AS
Statnett SF is responsible for the maintenance of the Norwegian User Conventions document for IEC 870-5-101.
The need for making new revisions of the document will be reviewed on annually bases. This document and new
revisions of this document will be available in PDF-format on Internet from Statnett SF: (www.statnett.no).
This document is free to be used by any project. We will kindly ask users to report errors or suggest improvements
to the document. Please send this to:
Statnett SF
P.B. 5192, Majorstua
N-0302 Oslo
Norway
or by E-mail to:
ketil.rian@statnett.no
1 INTRODUCTION
This paper will provide an overview of use of IEC 870-5-101 protocol in Norway.
The IEC Technical Committee 57 ( Working Group 03) have developed a protocol standard for telecontrol, teleprotection, and
associated telecommunications for electric power systems. The result of this work is IEC 870-5. Five documents specify the
base IEC 870-5. The documents are:
The IEC Technical Committee 57 have also generated a companion standard IEC 870-5-101 especially for remote controlled
units RTU. The IEC 870-5-101 is based of the five documents IEC 870-5-1 - 5.
The Norwegian User Conventions is based on IEC 870-5-101 standard. The Norwegian User Conventions is generated for to
give an overview over functions and use of IEC standard in Norway
The document is generated to fill all needs for implementing the protocol. It should not be necessary to look into all the
standard documents.
IEC has approved supplementary definitions to IEC 870-5-101. If conflicts are detected between descriptions in Norwegian
User Conventions documents and the IEC 870-5-101 Companion standard document or Supplementary definitions, the
Norwegian User Conventions document shall be given the highest priority.
2 PROTOCOL STRUCTURE
Communication Protocols are the grammars through which computer-based devices communicate with one another
- the way they organise, and transmit the bits and bytes of electronic on-off (binary) signals whose patterns encode
data. Simply, a protocol is a set of rules that governs how message containing data and control information are
assembled at a source for their transmission across the network and then dissembled when they reach their
destination.
The 7-Layer stack is based on established international ISO protocol standards. The architecture intended to provide full
communications functionality based on the OSI Reference Model and is capable of supporting the majority and the industry
data communication requirements.
The 3 - layer stack is also based on stable international standards. The 3 - layer stack provides a simpler mechanism for data
communication.
7 - layer 3 - layer
7. Application 7. Application
6. Presentation
5. Session
4. Transport
3. Network
1. Physical 1. Physical
2.3 Definitions
For the purpose of this user conventions, the following definitions apply:
Companion standard
A companion standard adds semantics to the definitions of the basic standard or a functional profile. This may be expressed by
defining particular uses for information objects or by defining additional information objects, service procedures and parameters
of the basic standard.
A group (of information objects) is a selection of COMMON ADDRESSES or INFORMATION ADDRESSES which is specifically defined for
a particular system.
Control direction
The direction of transmission from the controlling station, typical a SCADA system, to a controlled station, typical a station
control system or a RTU..
Monitor direction
Unbalanced transmission
Unbalanced transmission procedures are used in supervisory control and data acquisition (SCADA) systems in which a master
station controls the data traffic by polling outstations sequentially. In this case the master station (master) is the primary station
that initiates all message transfers while outstations are secondary stations (slaves) that may transmit only when they are
polled.
The unbalanced mode procedure can be used generally, but must be used in party line configuration.
Balanced transmission
If balanced transmission procedures are used, each station may initiate message transfers.
The balanced mode procedure is restrict to “point to point or multiple point to point”.
In due to unbalanced mode is balanced mode the most effective way of communication on «point to point or multiple
point».Balanced transmission can be used in full duplex mode.
Controlled Station (Outstation, Remote station, Remote terminal unit (RTU), Slave station)
The physical layer uses ITU-T recommendations that provide binary symmetric and memoryless transmission on the required
medium in order to preserve the high level of data integrity of the defined block encoding method in the link layer.
The link layer consists of a number of link transmission procedures using explicit LINK PROTOCOL CONTROL INFORMATION (LPCI)
that are capable of carrying APPLICATION SERVICE DATA UNITs (ASDUs) as link-user data. The link layer uses a selection of frame
formats to provide the required integrity/efficiency and convenience of transmission.
The application user layer contains a number of "Application Functions" that involve the transmission of APPLICATION SERVICE
DATA UNITs (ASDUs) between source and destination.
The application layer of this companion standard does not use explicit APPLICATION PROTOCOL CONTROL INFORMATION (APCI).
This is implicit in the contents of the ASDU DATA UNIT IDENTIFIER field and in the type of link service used.
Figure1 shows the ENHANCED PERFORMANCE ARCHITECTURE model (EPA) and the selected standard definitions of the companion
standard.
Physical layer
The companion standard specifies ITU-T recommendations which define the interfaces between data circuit terminating
equipment (DCE) and data terminating equipment (DTE) of the controlling and the controlled station (see figure 2).
Data circuit
The standard interface between DTE and DCE is the asynchronous ITU-T V.24/ITU-T V.28 interface. The use of the required
interface signals depends on the operational mode of the used transmission channel.
Link layer
IEC 870-5-2 offers a selection of link transmission procedures using a control field and the optional address field. Links
between stations may be operated in either an unbalanced or a balanced transmission mode.
If the links from a central control station (controlling station) to several outstations (controlled stations) share a common
physical channel, then these links must be operated in an unbalanced mode to avoid the possibility of more than one outstation
attempting to transmit on the channel at the same time. The sequence in which the various outstations are granted access to
transmit on the channel is then determined by an application layer procedure in the controlling station.
Application layer
Application layer define ASDUs (telegram types).
3 TRANSMISSION SPECIFICATIONS
- Point - to - point
- Multiple point - to - point
- Party line
- Redundant line
Figure shows network configurations
Controlled
station
Controlled
station
Character format
1 Start bit
1 Stop bit
1 Parity bit (even)
8 Databits
7 6 5 4 3 2 1 0
Stop Parit 2 2 2 2 2 2 2 2 Start
Bit y Bit
Bit
Byte 1 Start character
1 1 0 1 1 0 1 0 0 0 0
Octet
per character the start bit, the stop bit and the even parity bit
per frame the start character, the length (2 bytes in frames with variable lengths), the
frame check sum and the end character and, upon detecting an error, the
line idle interval specified by rule 4
The frame is rejected if one of these checks fails, otherwise it is released to the user.
Figure shows the three frame formats in IEC 870-5-101 format class FT 1.2
Used of frame with fixed length and single character is more described in chapter 6 in this document.
Start and stop has always the same structure for all frames with variable length (ASDUs)
The APPLICATION SERVICE DATA UNIT (ASDU) is composed of a DATA UNIT IDENTIFIER and one or more INFORMATION
OBJECTs.
The DATA UNIT IDENTIFIER has always the same structure for all ASDUs. The INFORMATION OBJECTs of an ASDU are
always of the same structure and type, which are defined in the TYPE IDENTIFICATION field.
The structure of the DATA UNIT IDENTIFIER is:
- one octet TYPE IDENTIFICATION
- one octet VARIABLE STRUCTURE QUALIFIER
- one or two octets CAUSE OF TRANSMISSION
- one or two octets COMMON ADDRESS OF ASDU
The size of the COMMON ADDRESS OF ASDU is determined by a fixed system parameter, in this case one or two
octets. The COMMON ADDRESS is the station address, which may be structured to permit the addressing of the whole
station or just a particular station sector.
There is no data field LENGTH OF ASDU. Each frame has only a single ASDU available. The LENGTH OF ASDU is
determined by the frame length (two octets ).
TIME TAGs (if present) belong always to a single INFORMATION OBJECT.
Day of week is not used in this companion standard and set to 0.
The INFORMATION OBJECT consists of an INFORMATION OBJECT IDENTIFIER, a SET OF INFORMATION ELEMENTs and, if
present, a TIME TAG OF INFORMATION OBJECT.
The INFORMATION OBJECT IDENTIFIER consists only of the INFORMATION OBJECT ADDRESS. In most cases the COMMON
ADDRESS OF ASDU together with the INFORMATION OBJECT ADDRESS distinguishes the complete SET OF INFORMATION
ELEMENTs within a specific system. The combination of both addresses shall be unambiguous per system. The TYPE
IDENTIFICATION is not a part of a COMMON ADDRESS or an INFORMATION OBJECT ADDRESS.
NOTE
- The TYPE IDENTIFICATION defines the structure, the type and the format of the INFORMATION OBJECT. All INFORMATION OBJECTs of a
specific ASDU (telegrams) are of the same structure, type and format.
START CHARACTER
LENGTH
LENGTH
CONTROL FIELD
LINK
LINKADDRESS
ADRESS
TYPE IDENTIFICATION
DATA UNIT
VARIABLE STRUCTURE TYPE
QUALIFIER
CAUSE OF TRANSMISSION
COMMON ADDRESS OF
ASDU
COMMON ADDRESS OF
ASDU
INFORMATION OBJECT
APPLICATION ADDRESS
SERVICE INFORMATION OBJECT INFORMATION OBJECT
IDENTIFIER
DATA UNIT ADDRESS
INFORMATION OBJECT
ADDRESS
INFORMATION OBJECT SET OF INFORMATION
ELEMENTS
TIME TAG ms
TIME TAG OF
TIME TAG ms
OBJECT
Optional
per system
INFORMATION OBJECT n Variable
per ASDU
Bit 8 7 6 5 4 3 2 1
7 0
2 2 START CHARACTER
Bit 8 7 6 5 4 3 2 1
7 0
2 2 LENGTH
0
7
2 2 LENGTH (copy)
Le ngth s pe cifie s the num be r and s ubs e que nt us e r data octe ts including the control and addre s s fie lds
The control fie ld contains inform ation that characte ris e s the dire ction of the m e s s age , the type of the s e rvice
provide d and s upports control functions for s uppre s s ing los s e s or duplications of m e s s age s .
Unbalance d trans m is s ion proce dure s are us e d in s upe rvis ory control and data acquis ition s ys te m s in which a
m as te r s tation controls the data traffic by polling outs tations s e que ntially. In this cas e the m as te r s tation is the
prim ary s tation that initiate s all m e s s age trans fe rs while the outs tations are s e condary s tations that m ay trans m it
only whe n the y are polle d.
The following trans m is s ion s e rvice s , initiate d by the prim ary s tation, are s upporte d by the link:
- S e nd/re ply m ainly us e d for global m e s s age s and for cyclic s e tpoints in control loops .
- S e nd/confirm m ainly us e d for control com m ands and s e tpoint com m ands
-R e que s t/re s pond us e d for polling s e que nce s of this s e rvice m ay be us e d for cyclic updating
functions .
Bit 8 7 6 5 4 3 2 1
3 2 1 0
FCB FCV 2 2 2 2 Primary to secondary
RES PRM
ACD DFC FUNCTION Secondary to primary
CONTROL FIELD
RES Reserved
PRM Primary message
0 = message from secondary(responding) station.
1 = message from primary (initiating) station.
FCB Frame count bit: 0 - 1 = alternating bit for successive SEND/CONFIRM
or REQUEST/RESPOND services per station.
The frame count bit is used to delete losses and duplications of information transfers. The
primary station alternate the FCB bit for each new SEND/CONFIRM or
REQUEST/RESPOND transmission service directed to the same secondary station.
Thus the primary station keeps a copy of the frame count bit per secondary station.
If an expected reply is timed out (missing) or grabled, then the same
SEND/CONFIRM and REQUEST/RESPOND service is repeated with the same frame count
bit.
In case of reset commands the FCB bit is always zero, and upon receipt of these commands
the secondary station will always be set to expect the next frame primary to secondary with
FCV = valid (FCV = 1) to have the opposite setting of FCB, i.e. FCB equal to one
FCV Frame count bit valid.
0 = alternating function and FCB bit is invalid
1 = alternating function of FCB bit is valid
SEND/NO REPLY services, broadcast messages and other transmission services that
ignore the deletion of duplication or loss of information output do not alternate the FCB bit
and indicates this by a cleared FCV bit
DFC Data flow control
0 = further messages are acceptable
1 = further messages may cause data overflow
Secondary (responding) stations indicate to the message initiating (primary) station that an
immediate secession of further message may cause a buffer overflow.
Class 1 data transmission is typically used for events or for messages with high priority.
Class 2 data transmission is typically used for cyclic transmission or for low priority
messages.
Balanced transmission:
If blanched transmission procedures are used, each station may initiate message transfers. Because such stations
may act simultaneously as primary and secondary stations, they are called combined stations. In the following, the
combined stations is called either primary or secondary station according to its described functions.
The balanced transmission procedure is restricted to point to point and multiple point to point.
Bit 8 7 6 5 4 3 2 1
3 2 1 0
FCB FCV 2 2 2 2 Primary to secondary
DIR PRM
CONTROL FIELD
SEND/NO REPLY services, broadcast messages and other transmission services that
ignore the deletion of duplication or loss of information output do not alternate the FCB bit
and indicates this by a cleared FCV bit
DFC Data flow control
0 = further messages are acceptable
1 = further messages may cause data overflow
Secondary (responding) stations indicate to the message initiating (primary) station that an
immediate secession of further message may cause a buffer overflow.
RES Reserved
Bit 8 7 6 5 4 3 2 1
7 0
2 2 LINK-ADDRESS
Link transmission procedures using a control field and the optional address field.
Link - address field could be either one or two octets, or none, but not in Norwegian conventions.
TYPE IDENTIFICATION defines structure, type and format of the following INFORMATION OBJECT(s).
TYPE IDENTIFICATION is defined as:
TYPE IDENTIFICATION := UI8[1..8]<1..255>
Bit 8 7 6 5 4 3 2 1
7 0
2 2 TYPE IDENTIFICATION
INFORMATION OBJECTs with or without TIME TAGs are distinguished with different numbers of the TYPE IDENTIFICATION.
ASDUs with undefined values of TYPE IDENTIFICATION are acknowledged negatively and discarded by both
controlling and controlled stations.
De finitio n o f the s e mantic s o f the value s o f the type ide ntific atio n fie ld
The value <0> is not used. The range of values (numbers) 1 to 127 is defined in this user convention. The range of
numbers 128 to 255 is not defined. Full interoperability would be obtained only when using ASDUs having TYPE
IDENTIFICATION numbers in the range 1 to 127.
The following tables show the definition of TYPE IDENTIFICATION numbers for process and system information in
monitor and control direction.
Bit 8 7 6 5 4 3 2 1
VARIABLE
6 0
SQ 2 Number 2 STRUCTURE
QUALIFIER
Definition of the semantics of the values of the Variable Structure Qualifier field
The SQ bit specifies the method of addressing the following INFORMATION OBJECTs or ELEMENTs.
SQ = 0: Each single element or a combination of elements is addressed by the INFORMATION OBJECT ADDRESS. The
ASDU may consist of one or more than one equal INFORMATION OBJECTs. The number N is binary coded and defines
the number of the INFORMATION OBJECTs.
SQ = 1: A sequence of equal INFORMATION ELEMENTs (e.g. measured values of identical format) is addressed (see
5.1.5 of IEC 870-5-3) by the INFORMATION OBJECT ADDRESS. The INFORMATION OBJECT ADDRESS specifies the
associated address of the first INFORMATION ELEMENT of the sequence. The following INFORMATION ELEMENTs are
identified by numbers incrementing continuously by +1 from this offset. The number N is binary coded and defines
the number of the INFORMATION ELEMENTs. In case of a SEQUENCE OF INFORMATION ELEMENTs only one INFORMATION
OBJECT per ASDU is allocated.
Octet 3 of the DATA UNIT IDENTIFIER of the ASDU defines the CAUSE OF TRANSMISSION field which is specified in the
following.
Bit 8 7 6 5 4 3 2 1
5 0
T P/N 2 Cause 2 CAUSE
OF TRANSMISSION
Originator address Not used
De finitio n o f the s e mantic s o f the value s o f the c aus e o f trans mis s io n fie ld
The CAUSE OF TRANSMISSION directs the ASDU to a specific application task (program) for processing.
The P/N-bit indicates the positive or negative confirmation of activation requested by the primary application
function. In the case of irrelevance the P/N-bit is zero.
In addition to the cause the test-bit defines ASDUs which were generated during test conditions. It is used e.g. to
test transmission and equipment without controlling the process.
ASDUs marked (CON) in control direction are confirmed application services and may be mirrored in monitor
direction with different CAUSES OF TRANSMISSION. The originator address is not used in Norwegian conventions.
If the originator address is not used and there is more than a single source in a system defined, the ASDUs in
monitor direction have to be directed to all relevant sources of the system. In this case the specific affected source
has to select its specific ASDUs. The originator address is not used in Norwegian user conventions.
Semantics of CAUSE OF TRANSMISSION
Cause := UI6[1..6]<0..63>
<0> := not us e d
<1> := pe riodic, cyclic pe r/cyc
<2> := ba ckground s ca n* ba ck
<3> := s ponta ne ous s pont
<4> := initia lis e d init
<5> := re que s t or re que s te d re q
<6> := a ctiva tion a ct
<7> := a ctiva tion confirma tion a ctcon
<8> := de a ctiva tion de a ct
<9> := de a ctiva tion confirma tion de a ctcon
<10> := a ctiva tion te rmina tion a ctte rm
<11> := re turn informa tion ca us e d by a re mote comma nd re tre m
<12> := re turn informa tion ca us e d by a loca l comma nd re tloc
<13> := file tra ns fe r file
________________
* Used in monitor direction to synchronise the process information of the controlling and controlled stations on a low priority
continuous basis.
Octet 4 and optionally 5 of the DATA UNIT IDENTIFIER of the ASDU define the station address which is specified in the
following. The length of the COMMON ADDRESS (one or two octets) is a parameter which is fixed per system.
Bit 8 7 6 5 4 3 2 1
7 0 COMMON ADDRESS
2 2 OF ASDU
Bit 8 7 6 5 4 3 2 1
7 0 COMMON ADDRESS
2 2 low octet
15 8 COMMON ADDRESS
2 2 high octet
The COMMON ADDRESS is associated with all objects in an ASDU. The global address is a broadcast address
directed to all stations of a specific system. ASDUs with a broadcast address in control direction have to be
answered in monitor direction by ASDUs that contain the specific defined COMMON ADDRESS (station address).
Octet 1, optionally 2 and optionally 3 of the INFORMATION OBJECT are defined in the following. The length of the
INFORMATION OBJECT ADDRESS (one, two or three octets) is a parameter which is fixed per system.
The INFORMATION OBJECT ADDRESS is used as a destination address in control direction and a source address in
monitor direction.
In Norwegian user conventions are two octets for information object address used.
Bit 8 7 6 5 4 3 2 1
INFORMATION
7 0
2 2 OBJECT
ADDRESS
Bit 8 7 6 5 4 3 2 1
7 0 INFORMATION OBJECT
2 2 ADDRESS low octet
15 8 INFORMATION OBJECT
2 2 ADDRESS high octet
Bit 8 7 6 5 4 3 2 1
7 0 INFORMATION OBJECT
2 2 ADDRESS low octet
15 8
2 2
23 16 INFORMATION OBJECT
2 2 ADDRESS high octet
The third octet is only used in case of structuring the INFORMATION OBJECT ADDRESS to define unambiguous
addresses within a specific system. In all cases the maximum number of different INFORMATION OBJECT ADDRESSes
is limited with 65536 (as for two octets). If the INFORMATION OBJECT ADDRESS is not relevant (not used) in some
ASDUs, it is set to zero.
Object address with two octets are used in the Norwegian user conventions.
Information of elements for all ASDUs i Norwegian user conventions is described in chapter 5.
8 7 6 5 4 3 2 1 Bit
0 0 0 0 0 0 0 0 CHECKSUM
R ES R e s e rve d
FCB Fram e count bit = 0 / 1 alte rnating bit for s ucce s s ive S END / CONFIR M
FCV Fram e count bit valid =1 alte rnating function and FCB bit is valid
Fram e count bit valid = 0 alte rnating function and FCB is invalid
ACD Acce s s de m and = 0 no acce s s de m and for clas s 1 data trans m is s ion
8 7 6 5 4 3 2 1 Bit
0 0 0 0 0 0 0 0 CHECKSUM
R ES R e s e rve d
FCB Fram e count bit = 0 / 1 alte rnating bit for s ucce s s ive S END / CONFIR M
FCV Fram e count bit valid =1 alte rnating function and FCB bit is valid
Fram e count bit valid = 0 alte rnating function and FCB is invalid
ACD Acce s s de m and = 0 no acce s s de m and for clas s 1 data trans m is s ion
In balanced transmission mode each station may initiate message transfers. Because such stations may act simultaneously as
primary and secondary stations, they are called combined stations.
8 7 6 5 4 3 2 1 Bit
0 0 0 0 0 0 0 0 CHECKSUM
Figure 1 - Frame with fixed length sent from controlling station as primary station
8 7 6 5 4 3 2 1 Bit
0 0 0 0 0 0 0 0 CHECKSUM
Figure 2 - Frame with fixed length sent from controlled station as secondary (responding) station
DIR Phys ical trans m is s ion dire ction = 0 m e s s age from controlle d to controlling
s tation
FCB Fram e count bit = 0 / 1 alte rnating bit for s ucce s s ive S END / CONFIR M
FCV Fram e count bit valid =1 alte rnating function and FCB bit is valid
Fram e count bit valid = 0 alte rnating function and FCB is invalid
R ES R e s e rve d
8 7 6 5 4 3 2 1 Bit
0 0 0 0 0 0 0 0 CHECKSUM
Figure 3 - Frame with fixed length sent from controlled station as primary station
DIR Phys ical trans m is s ion dire ction = 0 m e s s age from controlle d to controlling
s tation
FCB Fram e count bit = 0 / 1 alte rnating bit for s ucce s s ive S END / CONFIR M
FCV Fram e count bit valid =1 alte rnating function and FCB bit is valid
Fram e count bit valid = 0 alte rnating function and FCB is invalid
R ES R e s e rve d
8 7 6 5 4 3 2 1 Bit
0 0 0 0 0 0 0 0 CHECKSUM
Figure 4 - Frame with fixed length sent from controlling station as secondary (responding) station
DIR Phys ical trans m is s ion dire ction = 1 m e s s age from controlling to controlle d
s tation
FCB Fram e count bit = 0 / 1 alte rnating bit for s ucce s s ive S END / CONFIR M
FCV Fram e count bit valid =1 alte rnating function and FCB bit is valid
Fram e count bit valid = 0 alte rnating function and FCB is invalid
R ES R e s e rve d
5.1 Interoperability
This companion standard presents sets of parameters and alternatives from which subsets have to be selected to
implement particular telecontrol systems. The marked functions and ASDUs in the interoperability list on the
following pages represent the current requirements for an IEC 60870-5-101 system according to the Norwegian
User Conventions. Certain parameter values, such as the number of octets in the common address of ASDUs
represent mutually exclusive alternatives. This means that only one value of the defined parameters is admitted per
system. This clause summarises the parameters of the previous clauses to facilitate a suitable selection for a
specific application. If a system is composed of equipment stemming from different manufacturers it is necessary
that all partners agree on the selected parameters.
The selected parameters are crossed in the white boxes. Unmarked white boxes represent parameters that are
currently not required. However, selections of such parameters can be agreed upon in specific projects. Black
check boxes indicates that these options cannot be selected.
Note
- Full specification of a system may require individual selection of additional parameters Recommended scaling factors for
measured values and setpoint commands are described in section 7.8.
Frame format FT 1.2, single character 1 and the fixed time out interval are used exclusively in this companion standard.
The maximum frame length can be selected per Controlled Station up to 255
Cause of transmission
(system-specific parameter)
(station-specific parameter)
File Transfer
(station-specific parameter)
Station initialisation
(station-specific parameter)
Remote initialisation
General interrogation
(system- or station-specific parameter)
global
group 1 group 7 group 13
group 2 group 8 group 14
group 3 group 9 group 15
group 4 group 10 group 16
group 5 group 11
group 6 group 12 Addresses per group have to be defined
Clock synchronisation
(station-specific parameter)
Clock synchronisation
Command transmission
(object-specific parameter)
Parameter loading
(object-specific parameter)
Threshold value
Smoothing factor
Low limit for transmission of measured value
High limit for transmission of measured value
Parameter activation
(object-specific parameter)
File transfer
(station-specific parameter)
0 0 0 0 0 0 0 1 TYPE IDENTIFICATION
T := Test
P/N := The P/N bit indicates positive or negative confirmation of activation requested by the primary
application function. In the case of irrelevance the P/N-bit is zero.
CAUSE OF TRANSMISSION
<2> := background scan (If Controlled stations has implemented cyclic transfer)
<3> := spontaneous
<11> := return information caused by a remote command
<12> := return information caused by a local command
<20> := interrogated by general interrogation
SIQ := CP8{SPI,RES,BL,SB,NT,IV}
SPI := BS1[1]<0..1>
<0> := OFF
<1> := ON
RES = RESERVE:= BS3[2..4]<0>
BL := BS1[5]<0..1>
<0> := not blocked
<1> := blocked
SB := BS1[6]<0..1>
<0> := not substituted
<1> := substituted
NT := BS1[7]<0..1>
<0> := topical
<1> := not topical
IV := BS1[8]<0..1>
Quality descriptor
BL = BLOCKED/NOT BLOCKED
The value of the INFORMATION OBJECT is blocked for transmission; the value remains in the state that was acquired before it was
blocked. Blocking and deblocking may be initiated e.g. by a local lock or a local automatic cause.
SB = SUBSTITUTED/NOT SUBSTITUTED
The value of the INFORMATION OBJECT is provided by input of an operator (dispatcher) or by an automatic source.
NT = NOT TOPICAL/TOPICAL
A value is topical if the most recent update was successful. It is not topical if it was not updated successfully during a specified
time interval or it is unavailable.
IV = INVALID/VALID
A value is valid if it was correctly acquired. After the acquisition function recognises abnormal conditions of the information
source (missing or non operating updating devices) the value is then marked invalid. The value of the INFORMATION OBJECT is not
defined under this condition. The mark INVALID is used to indicate to the destination that the value may be incorrect and cannot
be used.
0 0 0 0 0 0 0 1 TYPE IDENTIFICATION
T := Test
P/N := The P/N bit indicates positive or negative confirmation of activation requested by the primary
application function. In the case of irrelevance the P/N-bit is zero.
CAUSE OF TRANSMISSION
<2> := background scan (If Controlled stations has implemented cyclic transfer)
<3> := spontaneous
<11> := return information caused by a remote command
<12> := return information caused by a local command
<20> := interrogated by general interrogation
Quality descriptor
BL = BLOCKED/NOT BLOCKED
The value of the INFORMATION OBJECT is blocked for transmission; the value remains in the state that was acquired before it was
blocked. Blocking and deblocking may be initiated e.g. by a local lock or a local automatic cause.
SB = SUBSTITUTED/NOT SUBSTITUTED
The value of the INFORMATION OBJECT is provided by input of an operator (dispatcher) or by an automatic source.
NT = NOT TOPICAL/TOPICAL
A value is topical if the most recent update was successful. It is not topical if it was not updated successfully during a specified
time interval or it is unavailable.
IV = INVALID/VALID
A value is valid if it was correctly acquired. After the acquisition function recognises abnormal conditions of the information
source (missing or non operating updating devices) the value is then marked invalid. The value of the INFORMATION OBJECT is not
defined under this condition. The mark INVALID is used to indicate to the destination that the value may be incorrect and cannot
be used.
0 0 0 0 0 0 1 0 TYPE IDENTIFICATION
B15 B8
IV NT SB BL 0 0 0 SPI SIQ = Single-point information with quality
descriptor, see below. INFORMATION OBJECT 1
B15 B8
IV NT SB BL 0 0 0 SPI SIQ = Single-point information with quality
descriptor, see below. INFORMATION OBJECT i
Since each single-point information has its individual time tag, this type of ASDU does not exist as a sequence of information
elements.
T := Test
P/N := The P/N bit indicates positive or negative confirmation of activation requested by the primary
application function. In the case of irrelevance the P/N-bit is zero.
CAUSE OF TRANSMISSION
<2> := background scan (If Controlled stations has implemented cyclic transfer)
<3> := spontaneous
<11> := return information caused by a remote command
<12> := return information caused by a local command
<20> := interrogated by general interrogation
SIQ := CP8{SPI,RES,BL,SB,NT,IV}
SPI := BS1[1]<0..1>
<0> := OFF
<1> := ON
RES = RESERVE:= BS3[2..4]<0>
BL := BS1[5]<0..1>
<0> := not blocked
<1> := blocked
SB := BS1[6]<0..1>
<0> := not substituted
<1> := substituted
NT := BS1[7]<0..1>
<0> := topical
<1> := not topical
IV := BS1[8]<0..1>
Quality descriptor
BL = BLOCKED/NOT BLOCKED
The value of the INFORMATION OBJECT is blocked for transmission; the value remains in the state that was acquired before it was
blocked. Blocking and deblocking may be initiated e.g. by a local lock or a local automatic cause.
SB = SUBSTITUTED/NOT SUBSTITUTED
The value of the INFORMATION OBJECT is provided by input of an operator (dispatcher) or by an automatic source.
NT = NOT TOPICAL/TOPICAL
A value is topical if the most recent update was successful. It is not topical if it was not updated successfully during a specified
time interval or it is unavailable.
IV = INVALID/VALID
A value is valid if it was correctly acquired. After the acquisition function recognises abnormal conditions of the information
source (missing or non operating updating devices) the value is then marked invalid. The value of the INFORMATION OBJECT is not
defined under this condition. The mark INVALID is used to indicate to the destination that the value may be incorrect and cannot
be used.
0 0 0 0 0 0 1 1 TYPE IDENTIFICATION
INFORMATION OBJECT 1
B15 B8
IV NT SB BL 0 0 DPI DIQ = Double-point information with quality
descriptor, see below.
INFORMATION OBJECT i
B15 B8
IV NT SB BL 0 0 DPI DIQ = Double-point information with quality
descriptor, see below.
T := Test
P/N := The P/N bit indicates positive or negative confirmation of activation requested by the primary
application function. In the case of irrelevance the P/N-bit is zero.
CAUSE OF TRANSMISSION
<2> := background scan
<3> := spontaneous
<11> := return information caused by a remote command
<12> := return information caused by a local command
<20> := interrogated by general interrogation
DIQ := CP8{DPI,RES,BL,SB,NT,IV}
DPI := UI2[1..2]<0..3>
<0> := indeterminate or intermediate state
<1> := determined state OFF
<2> := determined state ON
<3> := indeterminate state
QDS := CP8{OV,RES,BL,SB,NT,IV}
OV := BS1[1]<0..1>
<0> := no overflow
<1> := overflow
RES = RESERVE:= BS3[2..4]<0>
BL := BS1[5]<0..1>
<0> := not blocked
<1> := blocked
SB := BS1[6]<0..1>
<0> := not substituted
<1> := substituted
NT := BS1[7]<0..1>
<0> := topical
<1> := not topical
IV := BS1[8]<0..1>
<0> := valid
<1> := invalid
The value of the INFORMATION OBJECT is beyond a predefined range of value (mainly applicable to analogue values).
BL = BLOCKED/NOT BLOCKED
The value of the INFORMATION OBJECT is blocked for transmission; the value remains in the state that was acquired before it was
blocked. Blocking and deblocking may be initiated e.g. by a local lock or a local automatic cause.
SB = SUBSTITUTED/NOT SUBSTITUTED
The value of the INFORMATION OBJECT is provided by input of an operator (dispatcher) or by an automatic source.
NT = NOT TOPICAL/TOPICAL
A value is topical if the most recent update was successful. It is not topical if it was not updated successfully during a specified
time interval or it is unavailable.
IV = INVALID/VALID
A value is valid if it was correctly acquired. After the acquisition function recognises abnormal conditions of the information
source (missing or non operating updating devices) the value is then marked invalid. The value of the INFORMATION OBJECT is not
defined under this condition. The mark INVALID is used to indicate to the destination that the value may be incorrect and cannot
be used.
0 0 0 0 0 0 1 1 TYPE IDENTIFICATION
B15 B8
IV NT SB BL 0 0 DPI DIQ = Double-point information with quality INFORMATION OBJECT 1
1 descriptor, see below, belongs to information object
address A.
T := Test
P/N := The P/N bit indicates positive or negative confirmation of activation requested by the primary
application function. In the case of irrelevance the P/N-bit is zero.
CAUSE OF TRANSMISSION
<2> := background scan (If Controlled stations has implemented cyclic transfer)
<3> := spontaneous
<11> := return information caused by a remote command
<12> := return information caused by a local command
<20> := interrogated by general interrogation
DIQ := CP8{DPI,RES,BL,SB,NT,IV}
DPI := UI2[1..2]<0..3>
<0> := indeterminate or intermediate state
<1> := determined state OFF
<2> := determined state ON
<3> := indeterminate state
RES = RESERVE:= BS2[3..4]<0>
BL := BS1[5]<0..1>
<0> := not blocked
<1> := blocked
SB := BS1[6]<0..1>
<0> := not substituted
<1> = substituted
NT := BS1[7]<0..1>
<0> := topical
<1> := not topical
IV := BS1[8]<0..1>
<0> := valid
<1> := invalid
Definition of quality descriptor (BL,SB,NT,IV) see below.
The value of the INFORMATION OBJECT is beyond a predefined range of value (mainly applicable to analogue values).
BL = BLOCKED/NOT BLOCKED
The value of the INFORMATION OBJECT is blocked for transmission; the value remains in the state that was acquired before it was
blocked. Blocking and deblocking may be initiated e.g. by a local lock or a local automatic cause.
SB = SUBSTITUTED/NOT SUBSTITUTED
The value of the INFORMATION OBJECT is provided by input of an operator (dispatcher) or by an automatic source.
NT = NOT TOPICAL/TOPICAL
A value is topical if the most recent update was successful. It is not topical if it was not updated successfully during a specified
time interval or it is unavailable.
IV = INVALID/VALID
A value is valid if it was correctly acquired. After the acquisition function recognises abnormal conditions of the information
source (missing or non operating updating devices) the value is then marked invalid. The value of the INFORMATION OBJECT is not
defined under this condition. The mark INVALID is used to indicate to the destination that the value may be incorrect and cannot
be used.
0 0 0 0 0 1 0 0 TYPE IDENTIFICATION
B15 B8
IV NT SB BL 0 0 DPI DIQ = Double-point information with quality
descriptor, see below. INFORMATION OBJECT 1
B15 B8
IV NT SB BL 0 0 DPI DIQ = Double-point information with quality
descriptor, see below. INFORMATION OBJECT i
T := Test
P/N := The P/N bit indicates positive or negative confirmation of activation requested by the primary
application function. In the case of irrelevance the P/N-bit is zero.
CAUSE OF TRANSMISSION
<2> := background scan (If Controlled stations has implemented cyclic transfer)
<3> := spontaneous
<11> := return information caused by a remote command
<12> := return information caused by a local command
<20> := interrogated by general interrogation
Since each double-point information has its individual time tag, this type of ASDU does not exist as a sequence of information
elements.
DIQ := CP8{DPI,RES,BL,SB,NT,IV}
DPI := UI2[1..2]<0..3>
<0> := indeterminate or intermediate state
<1> := determined state OFF
<2> := determined state ON
<3> := indeterminate state
RES = RESERVE:= BS2[3..4]<0>
BL := BS1[5]<0..1>
<0> := not blocked
<1> := blocked
SB := BS1[6]<0..1>
<0> := not substituted
<1> = substituted
NT := BS1[7]<0..1>
<0> := topical
<1> := not topical
IV := BS1[8]<0..1>
<0> := valid
<1> := invalid
Definition of quality descriptor (BL,SB,NT,IV) see below.
QDS := CP8{OV,RES,BL,SB,NT,IV}
OV := BS1[1]<0..1>
<0> := no overflow
<1> := overflow
RES = RESERVE:= BS3[2..4]<0>
BL := BS1[5]<0..1>
<0> := not blocked
<1> := blocked
SB := BS1[6]<0..1>
<0> := not substituted
<1> := substituted
NT := BS1[7]<0..1>
<0> := topical
<1> := not topical
IV := BS1[8]<0..1>
<0> := valid
<1> := invalid
The value of the INFORMATION OBJECT is beyond a predefined range of value (mainly applicable to analogue values).
BL = BLOCKED/NOT BLOCKED
The value of the INFORMATION OBJECT is blocked for transmission; the value remains in the state that was acquired before it was
blocked. Blocking and deblocking may be initiated e.g. by a local lock or a local automatic cause.
SB = SUBSTITUTED/NOT SUBSTITUTED
The value of the INFORMATION OBJECT is provided by input of an operator (dispatcher) or by an automatic source.
NT = NOT TOPICAL/TOPICAL
A value is topical if the most recent update was successful. It is not topical if it was not updated successfully during a specified
time interval or it is unavailable.
IV = INVALID/VALID
A value is valid if it was correctly acquired. After the acquisition function recognises abnormal conditions of the information
source (missing or non operating updating devices) the value is then marked invalid. The value of the INFORMATION OBJECT is not
defined under this condition. The mark INVALID is used to indicate to the destination that the value may be incorrect and cannot
be used.
0 0 0 0 0 1 0 1 TYPE IDENTIFICATION
B15 B8
VTI = Value with transient state indication, see below.
T Value INFORMATION OBJECT
T := Test
P/N := The P/N bit indicates positive or negative confirmation of activation requested by the primary
application function. In the case of irrelevance the P/N-bit is zero.
CAUSE OF TRANSMISSION
<2> := background scan (If Controlled stations has implemented cyclic transfer)
<3> := spontaneous
<11> := return information caused by a remote command
<12> := return information caused by a local command
<20> := interrogated by general interrogation
VTI := CP8{Value,Transient}
Value := I7[1..7]<-64..+63>
Transient := BS1[8]
<0> := equipment is not in transient state
<1> := equipment is in transient state
QDS := CP8{OV,RES,BL,SB,NT,IV}
OV := BS1[1]<0..1>
<0> := no overflow
<1> := overflow
RES = RESERVE:= BS3[2..4]<0>
BL := BS1[5]<0..1>
<0> := not blocked
<1> := blocked
SB := BS1[6]<0..1>
<0> := not substituted
<1> := substituted
NT := BS1[7]<0..1>
<0> := topical
<1> := not topical
IV := BS1[8]<0..1>
<0> := valid
<1> := invalid
The value of the INFORMATION OBJECT is beyond a predefined range of value (mainly applicable to analogue values).
BL = BLOCKED/NOT BLOCKED
The value of the INFORMATION OBJECT is blocked for transmission; the value remains in the state that was acquired before it was
blocked. Blocking and deblocking may be initiated e.g. by a local lock or a local automatic cause.
SB = SUBSTITUTED/NOT SUBSTITUTED
The value of the INFORMATION OBJECT is provided by input of an operator (dispatcher) or by an automatic source.
NT = NOT TOPICAL/TOPICAL
A value is topical if the most recent update was successful. It is not topical if it was not updated successfully during a specified
time interval or it is unavailable.
IV = INVALID/VALID
A value is valid if it was correctly acquired. After the acquisition function recognises abnormal conditions of the information
source (missing or non operating updating devices) the value is then marked invalid. The value of the INFORMATION OBJECT is not
defined under this condition. The mark INVALID is used to indicate to the destination that the value may be incorrect and cannot
be used.
0 0 0 0 0 1 1 1 TYPE IDENTIFICATION
B15 B8
B0
Bitstring
INFORMATION OBJECT 1
Bitstring BSI = Binary state information, 32 bit, see below.
Bitstring
B31
Bitstring
B15 B8
B0
Bitstring
INFORMATION OBJECT i
Bitstring BSI = Binary state information, 32 bit, see below.
Bitstring
B31
Bitstring
T := Test
P/N := The P/N bit indicates positive or negative confirmation of activation requested by the primary
application function. In the case of irrelevance the P/N-bit is zero.
CAUSE OF TRANSMISSION
<2> := background scan (If Controlled stations has implemented cyclic transfer)
<3> := spontaneous
<11> := return information caused by a remote command
<12> := return information caused by a local command
<20> := interrogated by general interrogation
BSI := 32BS1[1..32]<0..1>
Any of the bits can have any value. The content must be agreed upon by the end users.
QDS := CP8{OV,RES,BL,SB,NT,IV}
OV := BS1[1]<0..1>
<0> := no overflow
<1> := overflow
RES = RESERVE:= BS3[2..4]<0>
BL := BS1[5]<0..1>
<0> := not blocked
<1> := blocked
SB := BS1[6]<0..1>
<0> := not substituted
<1> := substituted
NT := BS1[7]<0..1>
<0> := topical
<1> := not topical
IV := BS1[8]<0..1>
<0> := valid
<1> := invalid
The value of the INFORMATION OBJECT is beyond a predefined range of value (mainly applicable to analogue values).
BL = BLOCKED/NOT BLOCKED
The value of the INFORMATION OBJECT is blocked for transmission; the value remains in the state that was acquired before it was
blocked. Blocking and deblocking may be initiated e.g. by a local lock or a local automatic cause.
SB = SUBSTITUTED/NOT SUBSTITUTED
The value of the INFORMATION OBJECT is provided by input of an operator (dispatcher) or by an automatic source.
NT = NOT TOPICAL/TOPICAL
A value is topical if the most recent update was successful. It is not topical if it was not updated successfully during a specified
time interval or it is unavailable.
IV = INVALID/VALID
A value is valid if it was correctly acquired. After the acquisition function recognises abnormal conditions of the information
source (missing or non operating updating devices) the value is then marked invalid. The value of the INFORMATION OBJECT is not
defined under this condition. The mark INVALID is used to indicate to the destination that the value may be incorrect and cannot
be used.
0 0 0 0 1 0 0 1 TYPE IDENTIFICATION
B15 B8
B15 B8
T := Test
P/N := The P/N bit indicates positive or negative confirmation of activation requested by the primary
application function. In the case of irrelevance the P/N-bit is zero.
CAUSE OF TRANSMISSION
<2> := background scan (If Controlled stations has implemented cyclic transfer)
<3> := spontaneous
<11> := return information caused by a remote command
<12> := return information caused by a local command
<20> := interrogated by general interrogation
NVA := F16[1..16]<-1..+1-2-15>
The resolution of measured values is not defined. If the resolution of the measured value is coarser than the unit of the LSB,
then the least significant bits are set to zero.
Negative numbers are presented in two’s complement.
QDS := CP8{OV,RES,BL,SB,NT,IV}
OV := BS1[1]<0..1>
<0> := no overflow
<1> := overflow
RES = RESERVE:= BS3[2..4]<0>
BL := BS1[5]<0..1>
<0> := not blocked
<1> := blocked
SB := BS1[6]<0..1>
<0> := not substituted
<1> := substituted
NT := BS1[7]<0..1>
<0> := topical
<1> := not topical
IV := BS1[8]<0..1>
<0> := valid
<1> := invalid
The value of the INFORMATION OBJECT is beyond a predefined range of value (mainly applicable to analogue values).
BL = BLOCKED/NOT BLOCKED
The value of the INFORMATION OBJECT is blocked for transmission; the value remains in the state that was acquired before it was
blocked. Blocking and deblocking may be initiated e.g. by a local lock or a local automatic cause.
SB = SUBSTITUTED/NOT SUBSTITUTED
The value of the INFORMATION OBJECT is provided by input of an operator (dispatcher) or by an automatic source.
NT = NOT TOPICAL/TOPICAL
A value is topical if the most recent update was successful. It is not topical if it was not updated successfully during a specified
time interval or it is unavailable.
IV = INVALID/VALID
A value is valid if it was correctly acquired. After the acquisition function recognises abnormal conditions of the information
source (missing or non operating updating devices) the value is then marked invalid. The value of the INFORMATION OBJECT is not
defined under this condition. The mark INVALID is used to indicate to the destination that the value may be incorrect and cannot
be used.
0 0 0 0 1 0 0 1 TYPE IDENTIFICATION
B15 B8
T := Test
P/N := The P/N bit indicates positive or negative confirmation of activation requested by the primary
application function. In the case of irrelevance the P/N-bit is zero.
CAUSE OF TRANSMISSION
<2> := background scan (If Controlled stations has implemented cyclic transfer)
<3> := spontaneous
<11> := return information caused by a remote command
<12> := return information caused by a local command
<20> := interrogated by general interrogation
NVA := F16[1..16]<-1..+1-2-15>
The resolution of measured values is not defined. If the resolution of the measured value is coarser than the unit of the LSB,
then the least significant bits are set to zero.
Negative numbers are presented in two’s complement.
QDS := CP8{OV,RES,BL,SB,NT,IV}
OV := BS1[1]<0..1>
<0> := no overflow
<1> := overflow
RES = RESERVE:= BS3[2..4]<0>
BL := BS1[5]<0..1>
<0> := not blocked
<1> := blocked
SB := BS1[6]<0..1>
<0> := not substituted
<1> := substituted
NT := BS1[7]<0..1>
<0> := topical
<1> := not topical
IV := BS1[8]<0..1>
<0> := valid
<1> := invalid
The value of the INFORMATION OBJECT is beyond a predefined range of value (mainly applicable to analogue values).
BL = BLOCKED/NOT BLOCKED
The value of the INFORMATION OBJECT is blocked for transmission; the value remains in the state that was acquired before it was
blocked. Blocking and deblocking may be initiated e.g. by a local lock or a local automatic cause.
SB = SUBSTITUTED/NOT SUBSTITUTED
The value of the INFORMATION OBJECT is provided by input of an operator (dispatcher) or by an automatic source.
NT = NOT TOPICAL/TOPICAL
A value is topical if the most recent update was successful. It is not topical if it was not updated successfully during a specified
time interval or it is unavailable.
IV = INVALID/VALID
A value is valid if it was correctly acquired. After the acquisition function recognises abnormal conditions of the information
source (missing or non operating updating devices) the value is then marked invalid. The value of the INFORMATION OBJECT is not
defined under this condition. The mark INVALID is used to indicate to the destination that the value may be incorrect and cannot
be used.
5.2.1.8 Measured value, normalised value with time tag (not used)
TYPE IDENT 10: M_ME_TA_1
0 0 0 0 1 0 1 0 TYPE IDENTIFICATION
B15 B8
INFORMATION OBJECT 1
Value B0 NVA = Normalised value, see below.
S Value B8
S Value B8
Figure 11 - ASDU: M_ME_TA_1 Measured value, normalised value with time tag
T := Test
P/N := The P/N bit indicates positive or negative confirmation of activation requested by the
primary application function. In the case of irrelevance the P/N-bit is zero.
CAUSE OF TRANSMISSION
<2> := background scan (If Controlled stations has implemented cyclic transfer)
<3> := spontaneous
<11> := return information caused by a remote command
<12> := return information caused by a local command
<20> := interrogated by general interrogation
NVA := F16[1..16]<-1..+1-2-15>
The resolution of measured values is not defined. If the resolution of the measured value is coarser than the unit of the LSB,
then the least significant bits are set to zero.
Negative numbers are presented in two’s complement.
QDS := CP8{OV,RES,BL,SB,NT,IV}
OV := BS1[1]<0..1>
<0> := no overflow
<1> := overflow
RES = RESERVE:= BS3[2..4]<0>
BL := BS1[5]<0..1>
<0> := not blocked
<1> := blocked
SB := BS1[6]<0..1>
<0> := not substituted
<1> := substituted
NT := BS1[7]<0..1>
<0> := topical
<1> := not topical
IV := BS1[8]<0..1>
<0> := valid
<1> := invalid
The value of the INFORMATION OBJECT is beyond a predefined range of value (mainly applicable to analogue values).
BL = BLOCKED/NOT BLOCKED
The value of the INFORMATION OBJECT is blocked for transmission; the value remains in the state that was acquired before it was
blocked. Blocking and deblocking may be initiated e.g. by a local lock or a local automatic cause.
SB = SUBSTITUTED/NOT SUBSTITUTED
The value of the INFORMATION OBJECT is provided by input of an operator (dispatcher) or by an automatic source.
NT = NOT TOPICAL/TOPICAL
A value is topical if the most recent update was successful. It is not topical if it was not updated successfully during a specified
time interval or it is unavailable.
IV = INVALID/VALID
A value is valid if it was correctly acquired. After the acquisition function recognises abnormal conditions of the information
source (missing or non operating updating devices) the value is then marked invalid. The value of the INFORMATION OBJECT is not
defined under this condition. The mark INVALID is used to indicate to the destination that the value may be incorrect and cannot
be used.
0 0 0 0 1 1 0 1 TYPE IDENTIFICATION
B15 B8
S Exponent
B15 B8
S Exponent
M_ME_NC_1 := CP{Data unit identifier, i(Information object address, IEEE STD 754,QDS)}
i := number of objects defined in the variable structure qualifier
CAUSE OF TRANSMISSION
<2> := background scan (If Controlled stations has implemented cyclic transfer)
<3> := spontaneous
<11> := return information caused by a remote command
<12> := return information caused by a local command
<20> := interrogated by general interrogation
Floating point number := Ri.j (Fraction, Exponent, Sign) i =32= total size of floating point number
-j
Fraction := F := Uij[1..j]<0..1-2 > j =23= size of fraction
i-j-1
Exponent := E := Uii-j-1[j+1..i-1]<0..2 > i-j-1 =7= size of exponent
Sign := S := BS1[i] S<0> := positive
S<1> := negative
QDS := CP8{OV,RES,BL,SB,NT,IV}
OV := BS1[1]<0..1>
<0> := no overflow
<1> := overflow
RES = RESERVE:= BS3[2..4]<0>
BL := BS1[5]<0..1>
<0> := not blocked
<1> := blocked
SB := BS1[6]<0..1>
<0> := not substituted
<1> := substituted
NT := BS1[7]<0..1>
<0> := topical
<1> := not topical
IV := BS1[8]<0..1>
<0> := valid
<1> := invalid
The value of the INFORMATION OBJECT is beyond a predefined range of value (mainly applicable to analogue values).
BL = BLOCKED/NOT BLOCKED
The value of the INFORMATION OBJECT is blocked for transmission; the value remains in the state that was acquired before it was
blocked. Blocking and deblocking may be initiated e.g. by a local lock or a local automatic cause.
SB = SUBSTITUTED/NOT SUBSTITUTED
The value of the INFORMATION OBJECT is provided by input of an operator (dispatcher) or by an automatic source.
NT = NOT TOPICAL/TOPICAL
A value is topical if the most recent update was successful. It is not topical if it was not updated successfully during a specified
time interval or it is unavailable.
IV = INVALID/VALID
A value is valid if it was correctly acquired. After the acquisition function recognises abnormal conditions of the information
source (missing or non operating updating devices) the value is then marked invalid. The value of the INFORMATION OBJECT is not
defined under this condition. The mark INVALID is used to indicate to the destination that the value may be incorrect and cannot
be used.
0 0 0 0 1 1 0 1 TYPE IDENTIFICATION
B15 B8
S Exponent
S Exponent
Figure 13 - ASDU: M_ME_NC_1 Sequence of measured values, short floating point number
M_ME_NC_1 := CP{Data unit identifier, Information object address, j(IEEE STD 754,QDS)}
j := number of elements defined in the variable structure qualifier
T := Test
P/N := The P/N bit indicates positive or negative confirmation of activation requested by the primary
application function. In the case of irrelevance the P/N-bit is zero.
CAUSE OF TRANSMISSION
<2> := background scan (If Controlled stations has implemented cyclic transfer)
<3> := spontaneous
<11> := return information caused by a remote command
<12> := return information caused by a local command
<20> := interrogated by general interrogation
Floating point number := Ri.j (Fraction, Exponent, Sign) i =32= total size of floating point number
-j
Fraction := F := Uij[1..j]<0..1-2 > j =23= size of fraction
i-j-1
Exponent := E := Uii-j-1[j+1..i-1]<0..2 > i-j-1 =7= size of exponent
Sign := S := BS1[i] S<0> := positive
S<1> := negative
Quality descriptor:
QDS := CP8{OV,RES,BL,SB,NT,IV}
OV := BS1[1]<0..1>
<0> := no overflow
<1> := overflow
RES = RESERVE:= BS3[2..4]<0>
BL := BS1[5]<0..1>
<0> := not blocked
<1> := blocked
SB := BS1[6]<0..1>
<0> := not substituted
<1> := substituted
NT := BS1[7]<0..1>
<0> := topical
<1> := not topical
IV := BS1[8]<0..1>
<0> := valid
<1> := invalid
BL = BLOCKED/NOT BLOCKED
The value of the INFORMATION OBJECT is blocked for transmission; the value remains in the state that was acquired before it was
blocked. Blocking and deblocking may be initiated e.g. by a local lock or a local automatic cause.
SB = SUBSTITUTED/NOT SUBSTITUTED
The value of the INFORMATION OBJECT is provided by input of an operator (dispatcher) or by an automatic source.
NT = NOT TOPICAL/TOPICAL
A value is topical if the most recent update was successful. It is not topical if it was not updated successfully during a specified
time interval or it is unavailable.
IV = INVALID/VALID
A value is valid if it was correctly acquired. After the acquisition function recognises abnormal conditions of the information
source (missing or non operating updating devices) the value is then marked invalid. The value of the INFORMATION OBJECT is not
defined under this condition. The mark INVALID is used to indicate to the destination that the value may be incorrect and cannot
be used.
0 0 0 1 0 0 0 0 TYPE IDENTIFICATION
B15 B8
Value B8
BCR = Binary counter reading, see below.
Value B16
IV CA CY Sequence number
B15 B8
Value B8
BCR = Binary counter reading, see below.
Value B16
IV CA CY Sequence number
CAUSE OF TRANSMISSION
<3> := spontaneous
SQ = sequence number
CY = carry
CA = counter was adjusted
IV = invalid
0 0 0 1 1 1 1 0 TYPE IDENTIFICATION
B15 B8
IV NT SB BL 0 0 0 SPI SIQ = Single-point information with quality
descriptor, see below. INFORMATION OBJECT 1
7 0
B Milliseconds B Milliseconds 0..59 999 ms
B15 Milliseconds B8
IV = Invalid time, Res = Spare bit
IV Res1 B5 Minutes B0 Minutes 0..59 min
B15 B8
IV NT SB BL 0 0 0 SPI SIQ = Single-point information with quality
descriptor, see below. INFORMATION OBJECT i
B15 Milliseconds B8
IV = Invalid time, Res = Spare bit
IV Res1 B5 Minutes B0 Minutes 0..59 min
Since each single-point information has its individual time tag, this type of ASDU does not exist as a sequence of information
elements.
T := Test
P/N := The P/N bit indicates positive or negative confirmation of activation requested by the primary
application function. In the case of irrelevance the P/N-bit is zero.
CAUSE OF TRANSMISSION
<2> := background scan (If Controlled stations has implemented cyclic transfer)
<3> := spontaneous
<11> := return information caused by a remote command
<12> := return information caused by a local command
<20> := interrogated by general interrogation
SIQ := CP8{SPI,RES,BL,SB,NT,IV}
SPI := BS1[1]<0..1>
<0> := OFF
<1> := ON
RES = RESERVE:= BS3[2..4]<0>
BL := BS1[5]<0..1>
<0> := not blocked
<1> := blocked
SB := BS1[6]<0..1>
<0> := not substituted
<1> := substituted
NT := BS1[7]<0..1>
<0> := topical
<1> := not topical
IV := BS1[8]<0..1>
Quality descriptor
BL = BLOCKED/NOT BLOCKED
The value of the INFORMATION OBJECT is blocked for transmission; the value remains in the state that was acquired before it was
blocked. Blocking and deblocking may be initiated e.g. by a local lock or a local automatic cause.
SB = SUBSTITUTED/NOT SUBSTITUTED
The value of the INFORMATION OBJECT is provided by input of an operator (dispatcher) or by an automatic source.
NT = NOT TOPICAL/TOPICAL
A value is topical if the most recent update was successful. It is not topical if it was not updated successfully during a specified
time interval or it is unavailable.
IV = INVALID/VALID
A value is valid if it was correctly acquired. After the acquisition function recognises abnormal conditions of the information
source (missing or non operating updating devices) the value is then marked invalid. The value of the INFORMATION OBJECT is not
defined under this condition. The mark INVALID is used to indicate to the destination that the value may be incorrect and cannot
be used.
0 0 0 1 1 1 1 1 TYPE IDENTIFICATION
B15 B8
IV NT SB BL 0 0 DPI DIQ = Double-point information with quality
descriptor, see below. INFORMATION OBJECT 1
B15 Milliseconds B8
IV = Invalid time, Res = Spare bit
IV Res1 B5 Minutes B0 Minutes 0..59 min
B15 B8
IV NT SB BL 0 0 DPI DIQ = Double-point information with quality
descriptor, see below. INFORMATION OBJECT i
B15 Milliseconds B8
IV = Invalid time, Res = Spare bit
IV Res1 B5 Minutes B0 Minutes 0..59 min
T := Test
P/N: := The P/N bit indicates positive or negative confirmation of activation requested by the primary
application function. In the case of irrelevance the P/N-bit is zero.
CAUSE OF TRANSMISSION
<2> := background scan (If Controlled stations has implemented cyclic transfer)
<3> := spontaneous
<11> := return information caused by a remote command
<12> := return information caused by a local command
<20> := interrogated by general interrogation
Since each double-point information has its individual time tag, this type of ASDU does not exist as a sequence of information
elements.
DIQ := CP8{DPI,RES,BL,SB,NT,IV}
DPI := UI2[1..2]<0..3>
<0> := indeterminate or intermediate state
<1> := determined state OFF
<2> := determined state ON
<3> := indeterminate state
RES = RESERVE:= BS2[3..4]<0>
BL := BS1[5]<0..1>
<0> := not blocked
<1> := blocked
SB := BS1[6]<0..1>
<0> := not substituted
<1> = substituted
NT := BS1[7]<0..1>
<0> := topical
<1> := not topical
IV := BS1[8]<0..1>
<0> := valid
<1> := invalid
Definition of quality descriptor (BL,SB,NT,IV) see below.
QDS := CP8{OV,RES,BL,SB,NT,IV}
OV := BS1[1]<0..1>
<0> := no overflow
<1> := overflow
RES = RESERVE:= BS3[2..4]<0>
BL := BS1[5]<0..1>
<0> := not blocked
<1> := blocked
SB := BS1[6]<0..1>
<0> := not substituted
<1> := substituted
NT := BS1[7]<0..1>
<0> := topical
<1> := not topical
IV := BS1[8]<0..1>
<0> := valid
<1> := invalid
The value of the INFORMATION OBJECT is beyond a predefined range of value (mainly applicable to analogue values).
BL = BLOCKED/NOT BLOCKED
The value of the INFORMATION OBJECT is blocked for transmission; the value remains in the state that was acquired before it was
blocked. Blocking and deblocking may be initiated e.g. by a local lock or a local automatic cause.
SB = SUBSTITUTED/NOT SUBSTITUTED
The value of the INFORMATION OBJECT is provided by input of an operator (dispatcher) or by an automatic source.
NT = NOT TOPICAL/TOPICAL
A value is topical if the most recent update was successful. It is not topical if it was not updated successfully during a specified
time interval or it is unavailable.
IV = INVALID/VALID
A value is valid if it was correctly acquired. After the acquisition function recognises abnormal conditions of the information
source (missing or non operating updating devices) the value is then marked invalid. The value of the INFORMATION OBJECT is not
defined under this condition. The mark INVALID is used to indicate to the destination that the value may be incorrect and cannot
be used.
0 0 1 0 0 0 0 0 TYPE IDENTIFICATION
B15 B8
VTI = Value with transient state indication, see below.
T Value INFORMATION OBJECT
B15 Milliseconds B8
IV = Invalid time, Res = Spare bit
IV Res1 B5 Minutes B0 Minutes 0..59 min
Figure 17 - ASDU: M_ST_TB_1 Step position information with time tag CP56Time2a
T := Test
P/N := The P/N bit indicates positive or negative confirmation of activation requested by the
primary application function. In the case of irrelevance the P/N-bit is zero.
CAUSE OF TRANSMISSION
<2> := background scan (If Controlled stations has implemented cyclic transfer)
<3> := spontaneous
<11> := return information caused by a remote command
<12> := return information caused by a local command
<20> := interrogated by general interrogation
VTI := CP8{Value,Transient}
Value := I7[1..7]<-64..+63>
Transient := BS1[8]
<0> := equipment is not in transient state
<1> := equipment is in transient state
QDS := CP8{OV,RES,BL,SB,NT,IV}
OV := BS1[1]<0..1>
<0> := no overflow
<1> := overflow
RES = RESERVE:= BS3[2..4]<0>
BL := BS1[5]<0..1>
<0> := not blocked
<1> := blocked
SB := BS1[6]<0..1>
<0> := not substituted
<1> := substituted
NT := BS1[7]<0..1>
<0> := topical
<1> := not topical
IV := BS1[8]<0..1>
<0> := valid
<1> := invalid
The value of the INFORMATION OBJECT is beyond a predefined range of value (mainly applicable to analogue values).
BL = BLOCKED/NOT BLOCKED
The value of the INFORMATION OBJECT is blocked for transmission; the value remains in the state that was acquired before it was
blocked. Blocking and deblocking may be initiated e.g. by a local lock or a local automatic cause.
SB = SUBSTITUTED/NOT SUBSTITUTED
The value of the INFORMATION OBJECT is provided by input of an operator (dispatcher) or by an automatic source.
NT = NOT TOPICAL/TOPICAL
A value is topical if the most recent update was successful. It is not topical if it was not updated successfully during a specified
time interval or it is unavailable.
IV = INVALID/VALID
A value is valid if it was correctly acquired. After the acquisition function recognises abnormal conditions of the information
source (missing or non operating updating devices) the value is then marked invalid. The value of the INFORMATION OBJECT is not
defined under this condition. The mark INVALID is used to indicate to the destination that the value may be incorrect and cannot
be used.
0 0 1 0 0 0 1 0 TYPE IDENTIFICATION
B15 B8
INFORMATION OBJECT 1
Value B0 NVA = Normalised value, see below.
S Value B8
B15 Milliseconds B8
IV = Invalid time, Res = Spare bit
IV Res1 B5 Minutes B0 Minutes 0..59 min
S Value B8
B15 Milliseconds B8
IV = Invalid time, Res = Spare bit
IV Res1 B5 Minutes B0 Minutes 0..59 min
Figure 18 - ASDU: M_ME_TD_1 Measured value, normalised value with time tag CP56Time2a
T := Test
P/N := The P/N bit indicates positive or negative confirmation of activation requested by the primary
application function. In the case of irrelevance the P/N-bit is zero.
CAUSE OF TRANSMISSION
<2> := background scan (If Controlled stations has implemented cyclic transfer)
<3> := spontaneous
<11> := return information caused by a remote command
<12> := return information caused by a local command
<20> := interrogated by general interrogation
NVA := F16[1..16]<-1..+1-2-15>
The resolution of measured values is not defined. If the resolution of the measured value is coarser than the unit of the LSB,
then the least significant bits are set to zero.
Negative numbers are presented in two’s complement.
QDS := CP8{OV,RES,BL,SB,NT,IV}
OV := BS1[1]<0..1>
<0> := no overflow
<1> := overflow
RES = RESERVE:= BS3[2..4]<0>
BL := BS1[5]<0..1>
<0> := not blocked
<1> := blocked
SB := BS1[6]<0..1>
<0> := not substituted
<1> := substituted
NT := BS1[7]<0..1>
<0> := topical
<1> := not topical
IV := BS1[8]<0..1>
<0> := valid
<1> := invalid
The value of the INFORMATION OBJECT is beyond a predefined range of value (mainly applicable to analogue values).
BL = BLOCKED/NOT BLOCKED
The value of the INFORMATION OBJECT is blocked for transmission; the value remains in the state that was acquired before it was
blocked. Blocking and deblocking may be initiated e.g. by a local lock or a local automatic cause.
SB = SUBSTITUTED/NOT SUBSTITUTED
The value of the INFORMATION OBJECT is provided by input of an operator (dispatcher) or by an automatic source.
NT = NOT TOPICAL/TOPICAL
A value is topical if the most recent update was successful. It is not topical if it was not updated successfully during a specified
time interval or it is unavailable.
IV = INVALID/VALID
A value is valid if it was correctly acquired. After the acquisition function recognises abnormal conditions of the information
source (missing or non operating updating devices) the value is then marked invalid. The value of the INFORMATION OBJECT is not
defined under this condition. The mark INVALID is used to indicate to the destination that the value may be incorrect and cannot
be used.
5.2.1.15 Measured value, short floating point number with time tag CP56Time2a
TYPE IDENT 36: M_ME_TF_1
Sequence of information objects (SQ = 0)
8 7 6 5 4 3 2 1 Bit
0 0 1 0 0 1 0 0 TYPE IDENTIFICATION
5 0
DATA UNIT IDENTIFIER
T P/N 2 Cause 2 CAUSE OF TRANSMISSION
1 octet (can be two)
1..254, 255 global address COMMON ADDRESS OF ASDU
7 0
B B INFORMATION OBJECT ADDRESS
B15 B8
S Exponent
15 8
B Milliseconds B
IV = Invalid time, Res = Spare bit
IV Res1 B5 Minutes B0 Minutes 0..59 min
B15 B8
S Exponent
B15 Milliseconds B8
IV = Invalid time, Res = Spare bit
IV Res1 B5 Minutes B0 Minutes 0..59 min
Figure 19 - ASDU: M_ME_TF_1 Measured value, short floating point number with time tag CP56Time2a
M_ME_TF_1 := CP{Data unit identifier, i(Information object address, IEEE STD 754,QDS, CP56Time2a)}
i := number of objects defined in the variable structure qualifier
CAUSE OF TRANSMISSION
<2> := background scan (If Controlled stations has implemented cyclic transfer)
<3> := spontaneous
<11> := return information caused by a remote command
<12> := return information caused by a local command
<20> := interrogated by general interrogation
Floating point number := Ri.j (Fraction, Exponent, Sign) i = total size of floating point number
-j
Fraction := F := Uij[1..j]<0..1-2 > j = size of fraction
i-j-1
Exponent := E := Uii-j-1[j+1..i-1]<0..2 > i-j-1 = size of exponent
Sign := S := BS1[i] S<0> := positive
S<1> := negative
QDS := CP8{OV,RES,BL,SB,NT,IV}
OV := BS1[1]<0..1>
<0> := no overflow
<1> := overflow
RES = RESERVE:= BS3[2..4]<0>
BL := BS1[5]<0..1>
<0> := not blocked
<1> := blocked
SB := BS1[6]<0..1>
<0> := not substituted
<1> := substituted
NT := BS1[7]<0..1>
<0> := topical
<1> := not topical
IV := BS1[8]<0..1>
<0> := valid
<1> := invalid
The value of the INFORMATION OBJECT is beyond a predefined range of value (mainly applicable to analogue values).
BL = BLOCKED/NOT BLOCKED
The value of the INFORMATION OBJECT is blocked for transmission; the value remains in the state that was acquired before it was
blocked. Blocking and deblocking may be initiated e.g. by a local lock or a local automatic cause.
SB = SUBSTITUTED/NOT SUBSTITUTED
The value of the INFORMATION OBJECT is provided by input of an operator (dispatcher) or by an automatic source.
NT = NOT TOPICAL/TOPICAL
A value is topical if the most recent update was successful. It is not topical if it was not updated successfully during a specified
time interval or it is unavailable.
IV = INVALID/VALID
A value is valid if it was correctly acquired. After the acquisition function recognises abnormal conditions of the information
source (missing or non operating updating devices) the value is then marked invalid. The value of the INFORMATION OBJECT is not
defined under this condition. The mark INVALID is used to indicate to the destination that the value may be incorrect and cannot
be used.
0 0 1 0 0 1 0 1 TYPE IDENTIFICATION
B15 B8
IV CA CY Sequence number
B15 Milliseconds B8
IV = Invalid time, Res = Spare bit
IV Res1 B5 Minutes B0 Minutes 0..59 min
15 8
B B
IV CA CY Sequence number
7
B Milliseconds B0 Milliseconds 0..59 999 ms
B15 Milliseconds B8
IV = Invalid time, Res = Spare bit
IV Res1 B5 Minutes B0 Minutes 0..59 min
6 0
Res4 B Years B Years 0..99
CAUSE OF TRANSMISSION
<3> := spontaneous
SQ = sequence number
CY = carry
CA = counter was adjusted
IV = invalid
0 0 1 0 1 1 0 1 TYPE IDENTIFICATION
CAUSE OF TRANSMISSION
in control direction:
<6> := activation
in monitor direction:
<7> := activation confirmation
<10> := activation termination
SCO := CP8{SCS,BS1,QOC}
SCS=Single command state := BS1[1]<0..1>
<0> := OFF
<1> := ON
BS1[2]<0>OC := CP6[3..8]{QU,S/E} see QOC below.
0 0 1 0 1 1 0 1 TYPE IDENTIFICATION
7 0
B B INFORMATION OBJECT ADDRESS
CAUSE OF TRANSMISSION
in control direction:
<6> := activation
in monitor direction:
<7> := activation confirmation
<10> := activation termination
DCO := CP8{DCS,QOC}
DCS=Double command state := UI2[1..2]<0..3>
<0> := not permitted
<1> := OFF
<2> := ON
<3> := not permitted
QOC := CP6[3..8]{QU,S/E} see QOC below
0 0 1 0 1 1 1 1 TYPE IDENTIFICATION
CAUSE OF TRANSMISSION
in control direction:
<6> := activation
in monitor direction:
<7> := activation confirmation
<10> := activation termination
RCO := CP8{RCS,QOC}
RCS=Regulating step
command state := UI2[1..2]<0..3>
<0> := not permitted
<1> := next step LOWER
<2> := next step HIGHER
<3> := not permitted
QOC := CP6[3..8]{QU,S/E} see below QOC
0 0 1 0 1 1 1 1 TYPE IDENTIFICATION
S Value B8
CAUSE OF TRANSMISSION
in control direction:
<6> := activation
in monitor direction:
<7> := activation confirmation
<10> := activation termination
NVA := F16[1..16]<-1..+1-2-15>
The resolution of measured values is not defined. If the resolution of the measured value is coarser than the unit of the LSB,
then the least significant bits are set to zero.
Negative numbers are presented in two’s complement.
0 0 1 1 0 0 1 1 TYPE IDENTIFICATION
B15 B8
Bitstring
B31 Bitstring
CAUSE OF TRANSMISSION
in control direction:
<6> := activation
in monitor direction:
<7> := activation confirmation
BSI := 32BS1[1..32]<0..1>
0 1 0 0 0 1 1 0 TYPE IDENTIFICATION
CAUSE OF TRANSMISSION
<4> := initialised
COI := CP8{UI7[1..7],BS1[8]}
UI7[1..7]<0..127>
<0> := local power switch on
<1> := local manual reset
<2> := remote reset
<3..31> := reserved for standard definitions of this companion standard (compatible range)
<32..127> := reserved for special use (private range)
BS1[8]<0..1>
<0> := initialisation with unchanged local parameters
<1> := initialisation after change of local parameters
0 1 1 0 0 1 0 0 TYPE IDENTIFICATION
CAUSE OF TRANSMISSION
in control direction:
<6> := activation
in monitor direction:
<7> := activation confirmation
<10> := activation termination
QOI := UI8[1..8]<0..255>
<20> := Station interrogation (global)
0 1 1 0 0 1 1 1 TYPE IDENTIFICATION
B15 B8
B15 Milliseconds B8
IV = Invalid time, Res = Spare bit
IV Res1 B5 Minutes B0 Minutes 0..59 min
CAUSE OF TRANSMISSION
in control direction:
<6> := activation
in monitor direction:
<3> := spontaneous
<7> := activation confirmation
In addition to the procedure shown in 6.7 of IEC/DIS 870-5-5, C_CS_NA_1 may be used in monitor direction for spontaneous
transmission of the clock time. For example to indicate the change of hour at an outstation, thus enabling messages to be
stored for more than 1h in an outstation without ambiguity.
0 1 1 0 1 0 0 0 TYPE IDENTIFICATION
7 0
B B INFORMATION OBJECT ADDRESS = 0
0 1 0 1 0 1 0 1
CAUSE OF TRANSMISSION
in control direction:
<6> := activation
in monitor direction:
<7> := activation confirmation
0 1 1 0 1 0 0 1 TYPE IDENTIFICATION
CAUSE OF TRANSMISSION
in control direction:
<6> := activation
in monitor direction:
<7> := activation confirmation
QRP := UI8[1..8]<0..255>
<0> := not used
<1> := general reset of process
<2> := reset of pending information with time tag of the event buffer
0 1 1 0 1 0 0 1 TYPE IDENTIFICATION
S Value B8
QPM = Qualifier of parameter of measured values,
UI8 see below.
CAUSE OF TRANSMISSION
in control direction:
<6> := activation
in monitor direction:
<7> := activation confirmation
NVA := F16[1..16]<-1..+1-2-15>
The resolution of measured values is not defined. If the resolution of the measured value is coarser than the unit of the LSB,
then the least significant bits are set to zero. Negative numbers are presented in two’s complement.
QPM := CP8{KPA,LPC,POP}
KPA = kind of parameter := UI6[1..6]<0..63>
<0> := not used
<1> := threshold value
<2> := smoothing factor (filter time constant)
LPC = local parameter change:= BS1[7]<0..1>
<0> := no change
<1> := change
POP = parameter in operation:= BS1[8]<0..1>
<0> := operation
<1> := not in operation
Threshold value is the minimum change of value required to cause a new transmission of a measured value.
Smoothing factor is filter constant used for the analogue input boards,
Each kind of parameter has to be defined by an unambiguous INFORMATION OBJECT ADDRESS per system.
0 1 1 1 0 0 0 0 TYPE IDENTIFICATION
B15 B8
S Exponent
QPM = Qualifier of parameter of measured values,
UI8 see below.
Figure 33 - ASDU: P_ME_NC_1 Parameter of measured values, short floating point number
P_ME_NC_1 := CP{Data unit identifier, Information object address, IEEE STD 754,QPM}
CAUSE OF TRANSMISSION
in control direction:
<6> := activation
in monitor direction:
<7> := activation confirmation
Threshold value is the minimum change of value required to cause a new transmission of a measured value.
Smoothing factor is filter constant used for the analogue input boards,
Each kind of parameter has to be defined by an unambiguous INFORMATION OBJECT ADDRESS per system.
6 Communication procedures
Table 6.1 shows a list of all basic communication procedures (basic application functions) that are offered in the IEC 870-5-101
companion standard. The subset of these procedures that are applicable to the Norwegian User Conventions are listed in bold
types.
1. Station initialisation
2. Data acquisition by polling
3. Cyclic data transmission
4. Acquisition of events
5. General interrogation
6. Clock synchronisation
7. Command transmission
8. Transmission of integrated totals
9. Parameter loading
10. Test procedure
11. File transfer
12. Acquisition of transmission delay
The relevant basic communication procedures are described in more detail in section 6.1, illustrated by separate sequence
diagrams for unbalanced and balanced communication systems. Note that only the telegrams that apply to the described
procedure are shown in the diagrams. Additional telegrams (e.g. event telegrams) may be transmitted in between the
procedure telegrams.
The basic communication procedures as described are error free procedures. If communication errors (e.g.disturbed frames)
occur during the execution of a basic procedure, a corresponding exception procedures is necessary to handle the error
situations. The different exception procedures are described in section 6.2.
The IEC 870-5-101 companion standard specifies a fixed link time-out interval to be used for repeated frame transmissions.
Link time-outs are indicated with bold vertical lines in the communication procedure diagrams. The time-out interval and
maximum number of retries are configurable and appropriate values will depend on the transmission system.
The initialisation of the controlling station starts e.g. with power off/on. Any data requested right before the initialisation cannot
be received by the controlling station because it is no longer available.
The link of the controlling station then establishes connection with the link of the controlled station by transmitting a "Request
status of link" that is answered by a "Status of link" response from the controlled station. The controlling station then transmits
a "Reset of remote link" that is answered by an "ACK", which confirms the start condition of the link layer of the controlled
station.
After the initialisation the controlling station is updated by issuing a general interrogation command to the controlled station. If
appropriate, the time of the two stations is then synchronised by a clock synchronisation command.
The sequential procedure for local initialisation of the controlling station is shown in fig. 6.1. Note that the link telegrams that
are used are fixed frame telegrams (ref. sec. 4.1) with Primary Message bit (PRM) and Function Code (FC) as indicated.
Request user
data class 1 PRM = 1, FC = 10 EVENT (example)
No response
link is not available,
reset or switched off
Link is available
Request PRM = 1, FC = 9
status of link
PRM = 0, FC = 11 Status of link
Reset of PRM = 1, FC = 0
remote link
PRM = 0, FC = 0 Ack Link is reset
FCB = 1 expected
Link conn. establ. in next telegram
The initialisation of the controlled station starts e.g. with power off/on. If operations with the controlling station are going on, this
station detects that its link is disconnected from the controlled station due to unconfirmed services.
After the maximum number of retries, the controlling station tries to re-establish the link connection by transmitting "Request
status of link" at specified time-out intervals. When the link of the controlled station is available, it confirms this condition by a
"Status of link" response to the controlling station. The controlling station then transmits a "Reset of remote link" that is
answered by an "ACK", which confirms the reset condition of the link of the controlled station.
To establish connection between the application functions of the two stations, an END OF INITIALIZATION message is
transmitted from the controlled station after a complete initialisation of the application function in the controlled station is
performed.
After the initialisation the controlling station is updated by issuing a general interrogation command to the controlled station. If
appropriate, the time of the two stations is then synchronised by a clock synchronisation command.
The sequential procedure for initialisation of the controlled station is shown in fig. 6.2. Note that the link telegrams that are used
are fixed frame telegrams (ref. sec. 4.1) with Primary Message bit and Function Code as indicated.
Reset of PRM = 1, FC = 0
remote link
PRM = 0, FC = 0 Ack Link is reset
FCB = 1 expected
in next telegram
Polling for
data starts
END of initialisation
TI-70
COT = 4
The remote initialisation of the controlled station is started with a RESET command message
from the controlling station. The controlled station responds with a RESET confirmation message,
whereafter all application processes above layer 7 of the ISO/EPA model are reset and initialised. Any messages pending
transmission are discarded.
The link of the controlling station then requests the status of the link of the controlled station. When the link of the controlled
station is available it answers with "Status of link", and polling for data starts.
If an optional "Reset of remote link" telegram is transmitted after the "Request status of link" telegram, a reset of the complete
controlled station has been performed.
After the initialisation the controlling station is updated by issuing a general interrogation command to the controlled station. If
appropriate, the time of the two stations is then synchronised by a clock synchronisation command.
The sequential procedure for initialisation of the controlled station is shown in fig. 6.3. Note that the link telegrams that are used
are fixed frame telegrams (ref. sec. 4.1) with Primary Message bit and Function Code as indicated.
Note also that this remote initialisation procedure specifies restart of the application processes (above layer 7) when the
Remote Initialisation application function is available. In case of unavailability the complete application user process
(application layer, application functions and application processes) may be restarted using the link service function "Reset of
user process" (not shown in fig. 6.3).
RESET command
TI-105
COT = 6 RESET command
ACK
Request user
data class 1(or 2) FIXED FRAME RESET confirmation
FC = 10(11)
RESET confirmation
TI-105
COT = 7
Reset of PRM = 1, FC = 0
remote link
(optional) PRM = 0, FC = 0 Ack Link is reset
FCB = 1 expected
in next telegram
Polling for
data starts
END of initialisation
TI-70
COT = 4
The initialisation of the controlling station starts e.g. with power off/on. The controlled station detect that the link of the
controlling station is disconnected due to unconfirmed services.
The controlled station then tries to establish the link by transmitting "Request status of link" at specified time out intervals.
When the link layer of the controlling station is available, it confirms this condition by a "Status of link" response to the
controlled station. The controlled station then transmits a "Reset of remote link" that is answered by an "ACK", which confirms
the reset condition of the link layer of the controlling station.
Then the controlling station synchronises its link with the controlled station by transmitting "Request status of link" and "Reset
of remote link". The controlled station responds with "Status of link" and "ACK" respectively, and when the "ACK" is received in
the controlling station the link connection is established in both directions.
After the initialisation the controlling station is updated by issuing a general interrogation command to the controlled station. If
appropriate, the time of the two stations is then synchronised by a clock synchronisation command.
The sequential procedure for local initialisation of the controlling station is shown in fig. 6.4. Note that the link telegrams that
are used are fixed frame telegrams (ref. sec. 4.1) with Primary Message bit (PRM) and Function Code (FC) as indicated.
PRM = 1, FC = 0 Reset of
remote link
Link is reset Ack PRM = 0, FC = 0
FCB = 1 expected
in next telegram
Request PRM = 1, FC = 9
status of link
PRM = 0, FC = 11 Status of link
Reset of PRM = 1, FC = 0
remote link
PRM = 0, FC = 0
Ack Link is reset
FCB = 1 expected
Link conn. establ. in next telegram
in both directions
The initialisation of the controlled station starts e.g. with power off/on. If operations with the controlling station are going on, this
station detects that its link is disconnected from the controlled station due to unconfirmed services.
After a number of unsuccessful retries, the controlling station tries to re-establish the link connection by transmitting "Request
status of link" at specified time-out intervals. When the link layer of the controlled station is available, it confirms this condition
by a "Status of link" response to the controlling station. The controlling station then transmits a "Reset of remote link" that is
answered by an "ACK", which confirms the reset condition of the link layer of the controlled station
Then the controlled station synchronises its link with the controlling station by transmitting "Request status of link" and "Reset
of remote link". The controlling station responds with "Status of link" and "ACK" respectively, and when the "ACK" is received in
the controlled station the link connection is established in both directions.
The initialisation procedure is then completed by an END OF INITIALIZATION message issued by the controlled station.
After the initialisation the controlling station is updated by issuing a general interrogation command to the controlled station. If
appropriate, the time of the two stations is then synchronised by a clock synchronisation command.
The sequential procedure for initialisation of the controlled station is shown in fig. 6.5. Note that the link telegrams that are used
are fixed frame telegrams (ref. sec. 4.1) with Primary Message bit and Function Code as indicated.
Reset of PRM = 1, FC = 0
remote link
PRM = 0, FC = 0 Ack Link is reset
FCB = 1 expected
in next telegram
PRM = 1, FC = 0 Reset of
remote link
Link is reset Ack PRM = 0, FC = 0
FCB = 1 expected
in next telegram Link conn. establ
in both directions
END of initialisation
TI-70
END of initialisation COT = 4
ACK
The remote initialisation of the controlled station is started with a RESET command message
from the controlling station. The controlled station responds with a RESET confirmation message,
whereafter all application processes above layer 7 of the ISO/EPA model are reset and initialised.
Any messages pending transmission are discarded.
A link synchronisation procedure identical to the local initialisation procedure of the controlled station then follows, except that
the "Reset of remote link" telegram from the controlling station is optional. If this telegram is used, a remote initialisation of the
complete controlled station is performed.
The remote initialisation procedure is then completed by an END OF INITIALIZATION message issued by the controlled
station.
After the initialisation the controlling station is updated by issuing a general interrogation command to the controlled station. If
appropriate, the time of the two stations is then synchronised by a clock synchronisation command.
The sequential procedure for initialisation of the controlled station is shown in fig. 6.6. Note that the link telegrams that are used
are fixed frame telegrams (ref. sec. 4.1) with Primary Message bit and Function Code as indicated.
Note also that this remote initialisation procedure specifies restart of the application processes (above layer 7) when the
Remote Initialisation application function is available. In case of unavailability the complete application user process
(application layer, application functions and application processes) may be restarted using the link service function "Reset of
user process" (not shown in fig. 6.6).
RESET command
TI-105
COT = 6 RESET command
ACK
RESET confirmation
TI-105
RESET confirmation COT = 7
ACK
Reset of PRM = 1, FC = 0
remote link
(optional) PRM = 0, FC = 0 Ack Link is reset
FCB = 1 expected
in next telegram
PRM = 1, FC = 0 Reset of
remote link
Link is reset Ack PRM = 0, FC = 0
FCB = 1 expected
in next telegram Link conn. establ.
in both directions
END of initialisation
TI-70
END of initialisation COT = 4
ACK
The Norwegian User Convention specifies data to be acquired from the controlled station solely by means of general
interrogation or event transfer, in order to reduce the traffic on the communication line. This communication procedure is
therefore not further described in this document.
Cyclic data transmission would typically be used to transfer measured values from the controlled station, but the Norwegian
User Convention specifies measured values to be transferred as events as a result of a deadband crossing (ref. previous
section). Hence this communication procedure is not further specified in this document.
It should be noted, however, that the link is prepared for this procedure even in unbalanced mode, as the IEC 870-5-101
companion standard specifies the link to poll for class 2 (cyclic) data.
Events occur spontaneously at the application level of the local (controlled) station. The local process requires an event buffer
to collect events that may appear faster than their transmission to the remote (controlling) station can be accomplished.
Fig. 6.7 shows the sequential procedure for event acquisition in unbalanced transmission systems.
The IEC 870-5 family of protocols specifies two classes of data, class1 and class 2 data. The IEC 870-5-101 companion
standard also specifies the link service "Request user data class 2" to be used for polling local (controlled) stations. Normally
class 1 contains spontaneous data while class 2 contains cyclic data (recommended in document IEC 870-5-2). Two
consequences are then possible in each local station when the poll telegram is received:
The returned ASDU may contain all or some of the events that are available in the controlled station when it was polled,
depending on the number and type of events present, and the maximum number of events allowed in one event ASDU
(blocking).
The link transmission procedures used for event acquisition in unbalanced transmission systems are always request/respond
procedures.
NOTE - If only spontaneous data is used for data transfer from the controlled station, a more efficient poll procedure is
achieved by defining all data as class 2 data and having the link requesting only class 2 data. The corresponding
event transfer procedure in this case is shown in fig. 6.8
Request user
data class 2 FIXED FRAME
CASE 1 FC = 11
NO EVENT Requested data
AVAILABLE NACK not available
EVENT1
EVENT2
EVENT3
CASE 2 EVENTn
Fig. 6.7 Acquisition of events (defined as class 1 data) in unbalanced transmission systems
Request user
data class 2 FIXED FRAME
CASE 1 FC = 11
NO EVENT Requested data
AVAILABLE NACK not available
EVENT1
EVENT2
EVENT3
CASE 2
EVENTS
AVAILABLE EVENTn
Request user
data class 2 FIXED FRAME
FC = 11 EVENT(S)
Fig. 6.8 Acquisition of events (defined as class 2 data) in unbalanced transmission systems
Fig. 6.9 shows the sequential procedure for event acquisition in balanced transmission systems.
Events that arrive in the controlled station are transmitted to the controlling station as soon as possible after they appear.
Events that arrive faster than transmission to the controlling station can be accomplished are buffered in the controlled station.
Buffered events may be transferred in the same event ASDU (blocking). The maximum number of events in an event ASDU is
determined by the configured maximum frame length of the system.
The link transmission procedures used for event acquisition in balanced systems are always send/confirm procedures. This
means that each transferred event telegram is followed by a single character ACK from the controlling station.
EVENT
TI-1 / TI-2 . . . / TI-40
EVENT COT = 3
ACK
EVENT1
EVENT2
EVENT3
EVENTn
EVENTS
TI-1 / TI-2 . . . / TI-40
EVENTS COT = 3
ACK
The general interrogation application function is used to update the controlling station after the internal station initialisation
procedure or when the controlling station detects a loss of information.
The general interrogation function of the controlling station requests the controlled station to transmit the actual values of all its
process variables. The interrogation procedure completes when the controlling station receives an End of Interrogation
message.
The interrogation procedure can be interrupted by events which may eventually occur in the controlled station. Care is then
required to avoid any confusion which may be caused by receiving interrogated information which has been made stale by an
event.
Fig. 6.10 shows the sequential procedure of general interrogation in unbalanced transmission systems, while the
corresponding procedure for balanced systems is shown in fig. 6.11. The information transfer is triggered by an
INTERROGATION command message from the controlling station to the controlled station, which responds with an
INTERROGATION confirmation message.
The controlled station transmits the interrogated information by means of one or more monitored information ASDUs. The last
information ASDU is then followed by an INTERROGATION termination message (End Of Interrogation), indicating that all
information has been transferred.
NOTE 1 - Normally spontaneous data (including interrogation responses) are defined as class 1 data and are acquired by the
"Request user data class 1" link telegram when the ACD bit is set. However, if all data are defined as class 2 data
(ref. sec. 6.1.2.1), responses (when available) to any command are acquired by the "Request user data class 2"
telegram, regardless of the ACD bit.
NOTE 2 - Event telegrams normally have higher priority than response telegrams to any command, and hence event telegrams
may arrive in between response telegrams in both unbalanced and balanced systems. Fig. 6.12 illustrates a
communication sequence (for a balanced system) where interrogation responses are mixed with events.
INTERROG. command
TI-100
COT = 6 INTERROG. command
ACK
Request user
data class 1(or 2) FIXED FRAME INTERROG. confirmation
FC = 10(11)
Request user
data class 1(or 2) FIXED FRAME
FC = 10(11) monitored INFORMATION
Request user
data class 1(or 2) FIXED FRAME
FC = 10(11) monitored INFORMATION
Request user
data class 1(or 2) FIXED FRAME
FC = 10(11) INTERROG. termination
INTERROG. command
TI-100
COT = 6 INTERROG. command
ACK
INTERROG. confirmation
TI-100
INTERROG. confirmation COT = 7
ACK
monitored INFORMATION
TI-1 / TI-3 . . . / TI-21
monitored INFORMATION COT = 20
ACK
monitored INFORMATION
TI-1 / TI-3 . . . / TI-21
monitored INFORMATION COT = 20
ACK
monitored INFORMATION
TI-1 / TI-2 . . . / TI-21
monitored INFORMATION COT = 20
ACK
interrog. TERMINATION
TI-100
interrog. TERMINATION COT = 10
ACK
INTERROG. command
TI-100
COT = 6 INTERROG. command
ACK
INTERROG. confirmation
TI-100
INTERROG. confirmation COT = 7
ACK
EVENT
TI-2 (example)
EVENT COT = 3
ACK
monitored INFORMATION
TI-1 / TI-2 . . . / TI-21
monitored INFORMATION COT = 20
ACK
EVENT
TI-4 (example)
EVENT COT = 3
ACK
interrog. TERMINATION
TI-100
interrog. TERMINATION COT = 10
ACK
Clocks of controlled stations are initially synchronised by the controlling station after initialisation and then re-synchronised
periodically.
Fig. 6.13 and 6.14 show the sequential procedures for clock synchronisation in unbalanced and balanced transmission
systems respectively. A CLOCK SYNCHRONIZATION command message containing the full current clock time is sent from the
controlling station. The actual time that is transferred is the time when the first bit of the clock synchronisation telegram is
transmitted.
The time information must be corrected by the controlling station according to the sum of the transmission delay and
transmission time before the synchronisation command is sent.
After the execution of the clock synchronisation the controlled station generates a confirmation message which contains the
local time before synchronisation.
It must be noted that when this procedure is used for time synchronisation the accuracy of the synchronisation will always
depend on the characteristics of the transmission line.
CL.SYNCH. command
TI-103
COT = 6 CL.SYNCH. command
ACK
Request user
data class 1(or 2) FIXED FRAME EVENT (with time before synch)
FC = 10(11)
Request user
data class 1(or 2) FIXED FRAME EVENT (with time after synch)
FC = 10(11)
CL.SYNCH. command
TI-103
COT = 6 CL.SYNCH. command
ACK
ACK
Calculate time correction
Set new time
CL.SYNCH. confirmation
TI-103
CL.SYNCH. confirmation COT = 7
ACK
ACK
Commands are used in telecontrol systems to cause a change of state of an operational equipment.
There are two standard procedures for command transmission:
Select/execute and direct commands may be assigned individually and independently to each commanded object in the
controlled station (by system configuration parameters in the controlling station).
The select and execute command is used by the controlling station to:
The sequential procedure for a select and execute command is shown in fig. 6.15 and 6.16 for unbalanced and balanced
systems respectively. The controlling station sends a SELECT command message to the controlled station, which responds by
a SELECT confirmation message if it is ready to accept the announced command. This procedure is non interruptible and the
time from the SELECT command to the SELECT confirmation is controlled by a configurable time-out interval.
A successful select procedure may then be deactivated by a "Break off command". This command is transmitted by a BREAK
OFF command message and the controlled station responds by a BREAK OFF confirmation message. The time between these
messages is controlled by a timeout.
If appropriate, an EXECUTE command message is sent to the controlled station, which responds by an EXECUTE confirmation
message (positive if the specified control action is about to begin, otherwise negative). This procedure is also non interruptible
and the time from the EXECUTE command to the EXECUTE confirmation is controlled by a configurable time-out interval.
An EXECUTE termination message is issued from the controlled station when the command application procedure is
completed successfully. The addressed equipment should now change its state, and the new state is indicated to the
controlling station by a spontaneous data message (EVENT) when reached.
The Norwegian user convention does not specify in which sequence the termination message and the change of state event
should arrive. Hence the application in the controlling station must check that the command has been properly executed.
If an EXECUTE command message is not received in the controlled station within a certain time interval after a SELECT
message, the select/execute procedure will time out in the controlled station. This time-out interval shall be configurable to a
maximum of 60 seconds.
Direct command
Direct commands are used for immediate control operations, and the sequential procedure is identical to the procedure that
starts with the EXECUTE command message in fig. 6.15 and 6.16
Having received the EXECUTE command message, the application function of the controlled station checks whether the
addressed command output is not blocked, i.e. that it is ready for execution. If the check is positive, a positive EXECUTE
confirmation message is returned and the operation starts. Otherwise a negative confirmation message is returned.
General Comments
While waiting for a SELECT / BREAK OFF / EXECUTE confirmation no new SELECT / BREAK OFF / EXECUTE command is
sent. This rule is applicable per controlled station.
When a select and execute command (single or double command, TI-45 or TI-46) has been given by the user process, no new
select and execute or direct command (except TI-47, TI-48 and TI-51) is treated by the protocol until the ongoing select and
execute command has reached any of the following states:
These rules are also applicable per controlled station. The aim is to have only one selected point in a controlled station at a
time, for security reasons. However, regulating step commands, set point commands and bit string commands (TI-47, TI-48
and TI-51) must be allowed in between single and double commands
If a command transmission request from the user process can't be treated for the moment it is queued and treated later.
Request user
data class 1(or 2) FIXED FRAME SELECT confirmation
FC = 10(11)
Request user
data class 1(or 2) FIXED FRAME BREAK OFF confirmation
FC = 10(11)
Request user
data class 1(or 2) FIXED FRAME EXECUTE confirmation
FC = 10(11)
Request user
data class 1(or 2) FIXED FRAME EXECUTE termination
FC = 10(11)
SELECT command
TI-45/ TI-46/ TI-47/ TI-48/TI-51
COT = 6, SE = 1 SELECT command
Time out
ACK
SELECT confirmation
TI-45/ TI-46/ TI-47/ TI-48/TI-51
SELECT confirmation COT = 7, SE = 1
ACK
ACK
BREAK OFF confirmation
TI-45/ TI-46/ TI-47/ TI-48/TI-51
BREAK OFF confirmation COT = 9, SE = 0
ACK
EXECUTE command
TI-45/ TI-46/ TI-47/ TI-48/TI-51
COT = 6, SE = 0 EXECUTE command
Time out
ACK
EXECUTE confirmation
TI-45/ TI-46/ TI-47/ TI-48/TI-51
EXECUTE confirmation COT = 7, SE = 0
ACK
EXECUTE termination
TI-45/ TI-46/ TI-47/ TI-48/TI-51
EXECUTE termination COT = 10, SE = 0
ACK
Integrated totals are values that are integrated over a specified period of time. The Norwegian User Convention specifies
counter values to be memorised (frozen) in buffers, without the counters being reset, before transmission to the controlling
station. Incremented values per period are then calculated in the controlling station.
The Norwegian User Convention also specifies integrated totals to be acquired as ordinary events in the controlling station, as
indicated in fig. 6.17 and 6.18 for unbalanced and balanced systems respectively.
Request user
data class 1(or 2) FIXED FRAME
FC = 10(11) INTEGRATED TOTAL
INTEGRATED TOTAL
TI-16
INTEGRATED TOTAL COT = 3
ACK
Parameter loading is used to change predefined parameters, e.g. deadband values that define when analogue measurements
are to be transmitted. Parameters can only be transmitted from the controlling station as a result of an operator command.
To load a new parameter value, the controlling station sends a PARAMETER LOAD command message to the controlled
station, which immediately activates the received parameter.
The parameter load command is then acknowledged by the controlled station by transmitting a PARAMETER LOAD
confirmation message, which contains the actual parameter value (new or old) that is currently in operation.
Information Object Addresses (IOAs) of parameters should be equal to the IOAs of the measured values to which they are
related.
The sequential procedure is shown in fig. 6.19 for unbalanced transmission systems and in fig. 6.20 for balanced transmission
systems.
NOTE - Downloaded parameters must be stored in permanent memory to ensure that correct parameter values are reloaded
when the controlled station is restarted.
ACK
The test procedure is used to check the complete loop from the controlling station to the controlled station and back.
A test command is initiated by the controlling station by sending a TEST command message. This ASDU is mirrored by the
controlled station as a TEST confirmation message. The controlling station compares the transmitted TEST message to the
mirrored message, and if the messages are identical the test result is positive.
The sequential procedure is shown in fig 6.21 for unbalanced transmission systems and in fig. 6.22 for balanced transmission
systems.
TEST command
TI-104
COT = 6 TEST command
Time out
ACK
Request user
data class 1(or 2) FIXED FRAME TEST confirmation
FC = 10(11)
TEST command
TI-104
COT = 6 TEST command
Time out
ACK
TEST confirmation
TI-104
TEST confirmation COT = 7
ACK
File transfer is not included in the current revision of the Norwegian User Convention and is therefore not further described in
this document.
Acquisition of transmission delay is an alternative procedure for determining the time correction in clock synchronisation
commands. This procedure is not covered by the Norwegian User Convention and is therefore not further described in this
document.
Transmission of data in control direction (commands, parameters etc.) is always done by means of send/confirm link
procedures in both unbalanced an balanced transmission systems. fig. 6.23 illustrates disturbed send/confirm procedures in
unbalanced systems using transmission of a TEST command in a party line configuration as an example.
In case 1 the SEND frame directed to station n is corrupted, and hence there is no CONFIRM to the TEST command. The
controlling station repeats the SEND frame with an unaltered frame count bit (FCB) in the control field of the link after time out.
In case 2 the CONFIRM frame directed to station n+1 is corrupted, and the controlling station also in this case repeats the
SEND frame with unaltered frame count bit (FCB) after time out. The controlled station detects that the new frame is a
repetition because of the unchanged frame count bit, and thus discards the data and transmits the previous CONFIRM frame
again.
Note that the send/confirm procedure including repetitions is completed before the next controlled station is addressed.
The number of repetitions before addressing the next station is a configurable parameter.
Data acquisition in monitoring direction (events, command confirmations, monitored information etc.) is always done by means
of request/respond link procedures in unbalanced transmission systems. Fig. 6.24 illustrates disturbed request/respond
procedures in unbalanced systems using acquisition of EVENTS in a party line configuration as an example.
In case 1 the REQUEST frame directed to station n is disturbed and hence no RESPOND frame is received. The controlling
station repeats the REQUEST frame with an unaltered frame count bit (FCB) to the same controlled station after time out.
In case 2 the RESPOND frame directed to station n+1 is disturbed, causing the controlling station to repeat the REQUEST
frame to the same controlled station with unaltered frame count bit (FCB) after time out. The controlled station always keeps a
copy of the last transmitted RESPOND frame, and because of the unchanged frame count bit it recognises the new REQUEST
frame as a repetition and transmits the previously transmitted response again.
Fig. 6.25 shows an example of data flow control in control direction in unbalanced systems.
A TEST command frame is erroneously sent from the controlling station although an overflow condition exists in the controlled
station. The frame is not accepted by the controlled station , and a NACK (negative acknowledgement, message not accepted)
is returned to the controlling station. A notification is given to the application function of the , and the TEST command is retried
later with success.
In general, if overflow occurs in control direction, the DFC bit should be set in responses from the controlled station, and the
controlling station should start to transmit "Request status of Link" cyclically to detect when the DFC bit is reset. If overflow
occurs in monitoring direction, the controlling station should pause the polling procedure until the overflow condition ceases.
Station n
TEST command (example)
TI-104 (example)
Disturbed SEND frame,
Time out e.g. with FCB = 1
CASE 1
FIXED FRAME
FC = 0
Station n+1
TEST command (example) SEND
frame with FCB = 0 TI-104 (example)
TEST command (example)
Time out FIXED FRAME
Disturbed ACK FC = 0
CASE 2
Repeated SEND TI-104 (example)
DISTURBED OR frame, FCB = 0 Repeated data discarded
MISSING ACK FIXED FRAME
FC = 0
Station n
EVENT (example)
Request user
data class 1 FIXED FRAME
CASE 1 FC = 10 Disturbed REQUEST frame,
e.g. with FCB = 1
DISTURBED Time out
REQUEST
FRAME
Request user FIXED FRAME
data class 1 FC = 10 Repeated frame with FCB = 1
RESPONSE frame (event)
EVENT (example) TI-2 (example)
Station n+1
EVENT (example)
If a telegram transfer in either control (send/confirm procedure) or monitoring direction (request/respond procedure) cannot be
accomplished within the configured maximum number of retries, the reason might be that the either the controlled station or the
communication line is down.
The first case requires a station initialisation procedure as described in section 6.1.1.5, while this section describes the similar
procedure to recover from a communication line fault.
The recovery procedure is shown in fig. 6.26. The faulty (e.g. disconnected) line causes the TEST command send/confirm
procedure to time out due to a missing ACK. This send confirm procedure is retried the configured number of times, before the
controlling station starts to transmit "Request status of link" telegrams (retries are not shown in fig. 6.23).
The controlling station continues to send "Request status of link" telegrams (which time out) until the communication line is
reconnected. The controlled station then responds with "Status of link", whereafter a "Reset of remote link" procedure follows,
and the communication is re-established.
Note that the link telegrams that are used are fixed frame telegrams (ref. sec. 4.1) with Primary Message bit and Function Code
as indicated.
Line is disconnected
TEST command (example )
Time out and TI-104 (example)
unsuccessful retries
No response,
Request line is
status of link PRM = 1, FC = 9 disconnected
(time out)
PRM = 0, FC = 11 Status
of link
Reset of PRM = 1, FC = 0
remote link
Ack Link is reset
PRM = 0, FC = 0 FCB = 1 expected
in next telegram
Communication
TEST command (example ) is re-established
TI-104 (example)
TEST command (example)
PRM = 0, FC = 0
Transmission of user data in both control direction and monitoring direction is always done by means of send/confirm link
procedures balanced transmission systems. Balanced transmission systems are restricted to point to point configurations that
are equipped with a duplex channel operation, and transmission of messages may take place in both directions simultaneously.
The figures 6.27 to 6.30 illustrate disturbed transmission procedures in balanced systems, using transfer of TEST commands in
control direction and transfer of EVENTS in monitoring direction as examples. Additional description of these exception
procedures is found in the subsequent sections.
In fig. 6.27 the SEND frame carrying the event is disturbed when it reaches the controlling station, and hence no CONFIRM is
received in the controlled station. The SEND frame is therefore repeated with the same frame count bit (FCB) after time-out.
In case of a disturbed SEND frame the receiving station waits until a specified line idle interval has elapsed before accepting a
new frame. Because the TEST command ACK arrives after this interval has elapsed, the simultaneous transfer of the TEST
command in control direction is carried out without any error. If the ACK had arrived before the idle time had elapsed it would
have been ignored by the controlling station, and also the TEST command telegram would have been retransmitted (but
discarded in the controlled station).
In fig. 6.28 a disturbed CONFIRM frame (ACK) belonging to a transferred EVENT frame is received in the controlled station.
The EVENT frame is then retransfered with an unaltered frame count bit (FCB) after time-out.
The simultaneous transfer of the TEST command frame in control direction is not influenced by this erroneous EVENT transfer
in the monitoring direction.
Fig. 6.29 shows an exception procedure where the channel in one direction (control direction in this example) is temporarily
disturbed. Both a CONFIRM frame corresponding to an EVENT transfer and a subsequent TEST command SEND frame in the
same direction are corrupted.
In this case both the EVENT frame in monitoring direction and the TEST command frame in control direction are retransmitted
with unchanged frame count bit (FCB) after time out.
Data flow control is handled by the link layer. Either the controlling or the controlled station may indicate an overflow condition
to the opposite station by setting the DFC bit in the control field.
Fig. 6.30 shows how data flow control in monitoring direction can be implemented. In case of a buffer overflow a fixed frame
ACK with the data flow control bit (DFC) set in the control byte is returned. The controlled station then starts to transmit
periodically the link telegram "Request status of link" until the controlling station indicates by the DFC bit set to 0 in the "Status
of link" response that further messages are acceptable.
Note that that the transfer of the TEST command telegram (example) in the control direction is unaffected by the flow
control procedure in the monitoring direction.
EVENT (example)
TEST command (example) TI-2 (example) Disturbed frame, FCB = 0
FCB = 0
ACK Time-out
ACK
EVENT (example)
TEST command (example) TI-2 (example) FCB = 0
FCB = 0
EVENT (example)
TI-104 (example) TEST command (example)
ACK
ACK
EVENT (example)
TI-2 (example) FCB = 0
FCB = 0
EVENT (example)
ACK
Received CONFIRM
TEST command (example) TI-104 (example) Time-out frame disturbed
Disturbed frame, FCB = 1 FCB = 1
Repeated SEND frame, FCB = 0
TI-2 (example)
FCB = 0 Received SEND
Received repeated frame disturbed
frame discarded
ACK
Time-out
Repeated SEND
frame, FCB = 1 TI-104 (example)
FCB = 1
TEST command (example)
ACK
EVENT (example)
TI-2 (example)
EVENT (example)
FIXED FRAME
FC = 0, DFC = 1 Further messages
may cause overflow
TEST command (example)
TI-104 (example) FIXED FRAME Request status of link
FC = 9
TEST command (example)
Status of link
FIXED FRAME
ACK FC = 0, DFC = 1 Further messages
may cause overflow
Status of link
FIXED FRAME
FC = 0, DFC = 0 Further messages
acceptable
EVENT (example)
TI-2 (example)
EVENT (example)
ACK
If a telegram transfer in either control or monitoring direction (send/confirm procedures) cannot be accomplished within the
configured maximum number of retries, the reason might be that the either the opposite station or the communication line is
down. The first case requires a station initialisation procedure as described in section 6.1.1.4 or 6.1.1.5, while this section
describes the similar procedures to recover from a communication line fault.
The recovery procedure in this case is shown in fig. 6.31. The disconnected line causes the TEST command
send/confirm procedure (example) to time out due to missing ACKs. This send/confirm procedure is retried a
configurable number of times before the controlling station starts to transmit "Request status of link" telegrams (retries
are not shown in fig. 6.31).
The controlling station continues to send "Request status of link" telegrams (which time out) until the communication
line is reconnected. The controlled station then responds with "Status of link", whereafter the controlling station
transmits a "Reset of remote link" command to reset the link of the controlled station
When the controlled station has transmitted an "Ack" to confirm that its link has been reset, it initiates a "Reset of
remote link" request to reset the link of the controlling station. This request is answered by an "Ack" from the
controlling station, whereafter the whole recovery procedure is terminated by a "Request status of link / Status of link"
sequence initiated by the controlling station.
The recovery procedure in this case is shown in fig. 6.32. The event transmission send/confirm procedure (example)
initiated by the controlled station times out due to a missing ACK, and the configured number of retries (not shown in
fig. 6.32) are executed without any response. The controlled station therefore starts to poll the link of the controlling
station by repeatedly transmitting "Request status of link".
When the line is reconnected, the controlled station initiates a reset of the link of the controlling station (via a
"Request status of link / Reset of remote link" sequence), which thereafter initiates a reset of the link of the controlled
station. The whole communication recovery procedure is terminated when the controlled station has confirmed the
reset of its link by an "Ack".
Note that communication recovery in both monitoring and control direction may start and go on simultaneously.
The link telegrams that are used are fixed frame telegrams (ref. sec. 4.1) with Primary Message bit (PRM) and Function Code
(FC) as indicated.
Reset of PRM = 1, FC = 0
remote link
PRM = 0, FC = 0 Ack Link is reset
FCB = 1 expected
in next telegram
PRM = 1, FC = 0 Reset of
remote link
Link is reset Ack PRM = 0, FC = 0
FCB = 1 expected
in next telegram Link conn. establ
in both directions
Communication
TEST command (example ) is re-established
TI-104 (example)
TEST command (example)
ACK
PRM = 1, FC = 0 Reset of
remote link
Link is reset Ack PRM = 0, FC = 0
FCB = 1 expected
in next telegram
Request PRM = 1, FC = 9
status of link
PRM = 0, FC = 11 Status of link
Reset of PRM = 1, FC = 0
remote link
PRM = 0, FC = 0
Ack Link is reset
FCB = 1 expected
Link conn. establ. in next telegram
in both directions
ACK
7 Functions
This chapter contains information about functionality which is not necessarily covered by the standard. However, the functions
described in this chapter are functions needed for the Norwegian marked, and thus they should be implemented as described
in this chapter.
When a buffer overflow occurs an internal Indication (Single Point Indication) shall be sent to the Master Station which decides
what to do with the situation, typically a General Interrogation. Recommended Information Object Address (IOA) for this
indication is 1.
The description of the event buffers must be understood logically. The actual data structure with corresponding software can be
implemented in many ways.
7.1.3 Indications
After a change of state of an Indication the event is transferred once with or without time-stamp. The default function will be
without time-stamp as a response to a and General Interrogation request and with time-stamp after a change of state event.
For this user convention the formats for with full time will be utilised. However transferring without time-stamp in all situations is
also a valid function. An Indications address can be represented with multiple entries in a queue.
In projects without time-stamp the following function is to prefer. One measured value address shall only have one entry in the
queue even if more events are generated before it is transferred to the Controlling Station. Transfer of the latest possible value
is always desirable.
In projects where measured values are transferred with local time-stamp the measured values can follow the same functions as
Indications with time-stamp with reduced number of entries.
7.1.6 Priorities
An Controlled Station should support a number priorities at least Station with a certain amount of data points. The highest or
more priorities can be mapped to class 1 (polling telegram for unbalanced mode) and the rest to class 2. Alternatively all
priorities can be mapped to class 2 since this is most efficient.
In an event driven protocol like IEC870-5-101 the Controlled Station decides the sequence of data to be sent to the Master
Station. The algorithm must guarantee that high priority events does not totally block events from lower priorities.
• After start-up of the Controlling Station, the Controlling Station starts the links with the link-telegram “Request Status of
Link” on both links. Controlling Station decides which line to use as primary line fulfil the start-up procedure on this
line.
• After restart of the Controlled Station it waits for initiative from the Controlling Station. When the Controlling Station is
ready it will follow the procedure in the previous point. The Controlled Station understands the line on which it receives
a “Reset of remote link” as the primary line.
• For supervising the backup line the Controlling Station sends “Request Status of Link” link-telegram cyclically on the
backup line.
• When the Controlling Station looses contact on the primary line or if the Controlling Station wants to change line for
other reasons, it sends a "Reset of Remote Link" and then starts polling on the other line and this line will now by
definition become primary line.
• The Controlled Station must guarantee that events are not lost during a switching of line. This means that an event
must be explicitly acknowledged by the Controlling Station before it is deleted in the Controlled Station. In unbalanced
mode an event is acknowledged by the Controlling station when the Controlled station receives a new message
(request) with an altered FCB bit. It is not necessary to perform a full General Interrogation after switching lines or after
a communication break, but the Controlling Station can decide to do so.
7.2.1.2 Initialisation
• After startup of the Controlling station, the Controlling Station sends a "Request Status of Link" on both channels. The
Controlled Station will reply with a "Status of Link" message to each of the "Request Status of Link" messages.
• The Controlling Station will then determine which channel to use as the primary channel and send a "Reset of Remote
Link" on the primary channel. The Controlling Station will continue to send a "Request Status of Link" message on the
backup channel cyclically. The Controlled Station will send a “Fixed frame confirmation (ACK)” message in response
to the "Reset of Remote Link" message on the primary channel.
• The Controlling Station will then send a "Poll Request" on the primary channel and the polling sequence has begun.
• The Controlling Station will continue to send "Request Status of Link" messages on the backup channel and the
Controlled Station will reply to each with a "Status of Link" message.
RQSL RQSL
Local
initialisation
(ref. fig 6.1) SL SL
RSRL RQSL
CON SL
RQUD RQSL
NACK SL
Active line
Fig 7.1 Initialisation of controlling station with redundant lines - unbalanced systems
RSRL RQSL
CON SL
RQUD RQSL
NACK SL
Active line
Fig 7.2 Initialisation of controlled station with redundant lines - unbalanced systems
• The Controlled Station will respond to the "Reset of Remote Link" message with a Fixed frame confirm (ACK)
message.
• The Controlling Station will then send a "Poll Request" and the polling sequence has been restarted on the new
primary channel.
• Once the new primary channel has established the polling sequence the Controlling Station will begin sending a
"Request Status of Link" message on the channel which lost communication with the Controlled Station .
Active line
RQUD RQSL
NACK SL
RQUD
Timeout
and max
retries
Notification to appl.layer
RQSL RQSL
SL
Line switch
(Communication
recovery on opposite RQSL RSRL
line, ref. fig. 6.26)
CON
RQSL RQUD
NACK
Active line
• The Controlled Station will then send a Fixed frame confirm (ACK) in response to the "Reset of Remote Link"
messages.
• The Controlling Station will then send a "Poll Request" and the polling sequence has been restarted on the new
primary channel.
• The Controlling Station will continue to send a "Request Status of Link" on the backup channel cyclically.
Active line
RQUD RQSL
NACK SL
SL SL
Line switch
(Communication
recovery on opposite RQSL RSRL
line, ref. fig. 6.26)
SL CON
RQSL RQUD
SL NACK
Active line
Fig 7.4 Redundant lines, application initiated line switch - unbalanced systems
Redundant communication implies the use of two separate communication lines. One line is defined to be the main
communication line while the other line is a backup line.
The backup line will typically operate at a different (slower) communication speed than the main line. A possible solution is
therefore to have two separate protocol links in each station (with identical link addresses) to handle the communication. The
line (link) which is used for communication at any time is defined to be the active line (link).
Selection and switch of active line is the responsibility of the controlling station, and may be performed either automatically or
manually, by e.g. the application layer or the user process. The controlled station always understands the line on which it
received the last ASDU (application telegram) as the active line.
The link telegram "Test Function of Link" is transmitted periodically in control direction on both lines to supervise the status of
the lines. An ACK will be received on the line which is defined to be the active line in the controlled station, and a NACK will be
received on the passive line. If no response is received on a line, either the line or the controlled station is down. This link test
procedure may also be performed periodically by the controlled station.
With respect to the figures 7.5 to 7.8 used to illustrate communication sequences it should be noted that the corresponding
confirmation ASDUs from the controlled station to the command ASDUs from the controlling station are not shown in the
figures.
The sequential procedure for initialisation of the controlling station with redundant lines is shown in fig. 7.5.
After restart of the controlling station, link connection is (attempted) established in both directions on both lines according to the
procedure described in section 6.1.1.4. Both links of the controlling station may by default be defined to be passive at the
moment the link layer is available after a restart. An arbitrary ASDU, e.g. the mandatory INTERROGATION command, is
therefore transmitted to define the active line (link).
RQSL RQSL
SL SL
RSRL RSRL
Link
initialisation ACK ACK
(ref. fig. 6.4)
RQSL RQSL
SL SL
RSRL RSRL
ACK ACK
INTERROGATION cmd
TI-100
COT=6 INTERROGATION cmd
ACK
TFOL TFOL
ACK NACK
Active line
Fig. 7.5 Initialisation of controlling station with redundant lines - balanced systems
The sequential procedure for initialisation of the controlled station with redundant lines is shown in fig. 7.6.
Link connection is (attempted) established in both directions on both lines according to the procedure described in section
6.1.1.5 (or 6.1.1.6 if remote initialisation. Both links of the controlled station are by default defined to be passive at the moment
the link layer is available after a restart. The controlled station therefore starts to transmit the link telegram “Test Function of
Link” cyclically on both lines to determine which line is the active line. The controlling station responds with ACK if a line is
active and NACK if it is passive. “Test Function of Link” must hence be repeated until ACK is received on either line, or an
arbitrary ASDU is received that defines the active line.
An END OF INITIALISATION message is then transmitted from the controlled station on the active line, and any
subsequent user data will be transmitted on the same line.
In general “Test Function of Link” may be sent any time by the controlled station to verify which line is the active
line.
RQSL RQSL
SL SL
RSRL RSRL
Link
initialisation
ACK ACK (ref. fig. 6.5)
RQSL RQSL
SL SL
RSRL RSRL
ACK ACK
TFOL TFOL
ACK NACK
END of initialisation
TI-70
END of initialization
ACK
TFOL TFOL
ACK NACK
Active line
Fig 7.6 Initialisation of controlled station with redundant lines - balanced systems
If communication fails on the active line when the controlling station attempts to transmit user data (e.g. a command
transmission ASDU), a line switch will be performed. The sequential procedure in this case is shown in fig. 7.7.
When timeout after maximum transmission retries has elapsed, the ASDU is directed to the opposite line, either by
retransmitting the ASDU on the opposite line or by terminating the ongoing application function and reinitiating it towards the
opposite line (ref. fig. 7.7). The opposite line is then defined to be the new active line.
A line switch will also be performed whenever the periodic line check procedure on the active line (Test Function of Link) times
out after maximum transmission retries, and hence reports a communication failure on the active line. An arbitrary ASDU, e.g. a
TEST command or an INTERROGATION command, will then be transmitted on the opposite line to define it as the new active
line.
A recommended interval for the periodic line check procedure is 10-20 seconds. To speed up the detection of
failures on the active line, however, the check interval on this line should be reduced after e.g. 2 seconds of no
traffic.
When the controlling station transmits "Test function of link" to check the lines, the controlled station may respond by a NACK
on both lines to tell the controlling station that it does not know which line is the active line. In this case the controlling station
may send an arbitrary ASDU (e.g. a TEST command) on the active line.
Active line
TFOL TFOL
ACK NACK
TI-45 (ex)
Timeout
and max
retries
Notification to user process
RQSL
ACK
RQSL TFOL
ACK
Active line
Fig 7.7 Redundant lines, user data from controlling station - balanced systems
If communication fails on the active line when the controlled station attempts to transmit user data (e.g. an event ASDU), the
controlled station must wait for the controlling station to detect the failure and perform a line switch before the ASDU may be
retransmitted on the opposite line. A sequential procedure to illustrate this case is shown in fig. 7.8.
When timeout after maximum transmission retries has elapsed, the controlled station will start to transmit “Request Status of
Link” periodically on the failed active line, according to standard procedure. Depending on the frequency of the periodic line
check, however, the controlling station will eventually detect the failure and will switch lines by transmitting e.g. a TEST
command or an INTERROGATION command on the opposite line. Upon reception of this command in the controlled station,
the opposite line will be defined as the new active line. Any ASDU waiting for transfer will then be retransmitted on the new
active line.
Whenever the active line fails during user data transfer, the controlled station will also start to transmit "Test Function of Link"
cyclically on the opposite line. The controlling station may always use the reception of this telegram on any line to immediately
force a line check on both lines, and hence perform a line switch as a result of this if necessary.
So long as the active line remains inoperative, the cyclic line check performed by the controlled station on the opposite line will
continue until either an ACK is received or an ASDU is received to define the opposite line as the new active line. If however,
communication on the failed active line recovers before any ASDU is received on the opposite line to switch lines, the
controlled station will transmit “Test Function of Link” cyclically on both lines to verify which line is the active line. If then the
recovered line is still the active line in the controlling station, the controlling station will respond with an ACK on this line, and
any ASDU waiting for transfer will be retransmitted on this line without any line switch having been performed.
The controlling station will only accept user data on the active line as valid data. If an ASDU is received on a line that is
passive, the controlling station will respond with a NACK. This does, however, not state anything about which line is active or
passive.
Active line
TFOL TFOL
ACK NACK
EVENT (example)
TI-2(ex)
Time out
and max
retries
Test function of link
triggered on opposite line
RQSL TFOL
NACK
TFOL TFOL
TEST command
RQSL TI-104
COT=6 TEST command
ACK
TI-2(ex)
EVENT (repeated)
ACK
RQSL TFOL
ACK
RQSL
Active line
Fig 7.8 Redundant lines, user data from controlled station - balanced systems
7.3 Addressing
There are 3 levels of addresses in the IEC870-5-101 protocol. Valid ranges are defined in chapter 4.
• For traditional RTUs with I/O boards etc. one Common Address of ASDU number is used and all the objects within the RTU
is given a unique Information Object Address. Each data type is given a range within the two octets.
• For a Station Control System the entire system is given one Common Address of ASDU. One of the two octets in the
Information Object Address is used to identify each Bay Controller or Protection Unit. The other octet is used to identify
each object within one unit.
• For a Station Control System each Bay Controller or Protection Unit is given a separate Common Address of ASDU. The
objects within one unit is identified by the Information Object Address field.
The Norwegian user conventions does not specify any system events from controlled station.
Each project have to implement the system events witch is necessary for the correct functionality.
The new parameter is stored in the controlled station. After initialisation of the controlled station, the last active value will be
maintained.
Each project have to implement the frame length witch is necessary for the correct functionality, and in due to the line quality
between controlled and controlling station
7.8 Scaling
VMax and VMin for each measured value shall be exchanged to give correct scaling between controlled and controlling station
regardless of the internal representation of the signal in controlled station.
Recommended interpretation of parameter values to be transferred from controlling station using ASDU 110:
VMax and VMin for each set point commands shall be exchanged to give correct scaling between controlling and controlled station
regardless of the internal representation of the signal in controlled station.